It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:3431 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661 | issue tracking third party advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2018:3432 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3470 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201904-06 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | third party advisory mailing list |