Vulnerabilities
Vulnerable Software
Redhat:  >> Gluster File System  Security Vulnerabilities
The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.
CVSS Score
6.5
EPSS Score
0.027
Published
2018-10-31


Contact Us

Shodan ® - All rights reserved