A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
The product dereferences a pointer that it expects to be valid but is NULL.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://tracker.ceph.com/issues/17635 | patch vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2815.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8626 | issue tracking |
http://www.securityfocus.com/bid/94488 | vdb entry third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2816.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2847.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2848.html | vendor advisory |