Multiple vulnerabilities in Red Hat OpenShift Jaeger



Published: 2021-06-23 | Updated: 2022-03-24
Risk High
Patch available YES
Number of vulnerabilities 31
CVE-ID CVE-2020-28362
CVE-2020-26116
CVE-2021-27219
CVE-2021-23336
CVE-2021-20305
CVE-2021-3450
CVE-2021-3449
CVE-2021-3326
CVE-2021-3177
CVE-2020-29363
CVE-2020-29362
CVE-2020-29361
CVE-2020-28196
CVE-2020-27619
CVE-2020-27618
CVE-2020-24977
CVE-2021-3114
CVE-2020-15358
CVE-2020-13776
CVE-2020-13434
CVE-2020-8927
CVE-2020-8286
CVE-2020-8285
CVE-2020-8284
CVE-2020-8231
CVE-2019-25013
CVE-2019-9169
CVE-2019-3842
CVE-2019-2708
CVE-2017-14502
CVE-2016-10228
CWE-ID CWE-20
CWE-93
CWE-190
CWE-327
CWE-254
CWE-476
CWE-617
CWE-119
CWE-674
CWE-94
CWE-835
CWE-125
CWE-682
CWE-787
CWE-120
CWE-299
CWE-200
CWE-825
CWE-264
CWE-276
CWE-193
Exploitation vector Network
Public exploit Public exploit code for vulnerability #7 is available.
Vulnerable software
Subscribe
Red Hat OpenShift Jaeger
Web applications / Modules and components for CMS

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 31 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU48480

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-28362

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in a number of math/big.Int methods (Div, Exp, DivMod, Quo, Rem, QuoRem, Mod, ModInverse, ModSqrt, Jacobi, and GCD). A remote attacker can pass large input data to the application, specifically as divisor or modulo argument larger than 3168 bits (on 32-bit architectures) or 6336 bits (on 64-bit architectures).

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) CRLF injection

EUVDB-ID: #VU48592

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-26116

CWE-ID: CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data in "http.client". A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Integer overflow

EUVDB-ID: #VU51456

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-27219

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the g_bytes_new() function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. A local user can run a specially crafted program to trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Input validation error

EUVDB-ID: #VU50814

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-23336

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform web cache spoofing attack.

The vulnerability exists due to insufficient validation of user-supplied input in django.utils.http.limited_parse_qsl() when parsing strings with a semicolon (";"). A remote attacker can pass specially crafted data to the application and perform a spoofing attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU52195

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-20305

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Security features bypass

EUVDB-ID: #VU51732

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-3450

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error in implementation of the X509_V_FLAG_X509_STRICT flag allows an attacker to overwrite a valid CA certificate using any non-CA certificate in the chain. As a result, a remote attacker can perform MitM attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) NULL pointer dereference

EUVDB-ID: #VU51733

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-3449

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when processing TLSv1.2 renegotiations. A remote attacker can send a maliciously crafted renegotiation ClientHello message, which omits the signature_algorithms extension but includes a signature_algorithms_cert extension, trigger a NULL pointer dereference error and crash the server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Reachable Assertion

EUVDB-ID: #VU50075

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-3326

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the iconv function in the GNU C Library (aka glibc or libc6) when processing invalid input sequences in the ISO-2022-JP-3 encoding. A remote attacker can pass specially crafted data to the application, trigger an assertion failure and crash the affected application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Buffer overflow

EUVDB-ID: #VU49973

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-3177

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary within the PyCArg_repr in _ctypes/callproc.c. A remote attacker can pass specially crafted input to the Python applications that accept floating-point numbers as untrusted input, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Buffer overflow

EUVDB-ID: #VU48946

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-29363

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a unspecified boundary error, related to processing of RPC requests. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Buffer overflow

EUVDB-ID: #VU48945

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-29362

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a unspecified boundary error, related to processing of RPC requests. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Buffer overflow

EUVDB-ID: #VU48944

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-29361

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a unspecified boundary error, related to processing of RPC requests. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Uncontrolled Recursion

EUVDB-ID: #VU48444

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-28196

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion in MIT Kerberos 5 (aka krb5) implementation when processing ASN.1-encoded Kerberos messages in lib/krb5/asn.1/asn1_encode.c. A remote attacker can pass specially crafted data to the application that uses Kerberos and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Code Injection

EUVDB-ID: #VU50621

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-27619

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to Python executed eval() function on the code, retrieved via HTTP protocol in Lib/test/multibytecodec_support.py CJK codec tests. A remote attacker with ability to intercept network traffic can perform a Man-in-the-Middle (MitM) attack and execute arbitrary Python code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Infinite loop

EUVDB-ID: #VU50404

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-27618

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within iconv implementation when processing multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings. A remote attacker can pass specially crafted data to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

16) Out-of-bounds read

EUVDB-ID: #VU46737

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-24977

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the xmlEncodeEntitiesInternal() function in libxml2/entities.c in libxml2. A remote attacker can pas specially crafted XML data to the affected application, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

17) Incorrect calculation

EUVDB-ID: #VU50047

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-3114

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to incorrect calculation performed by the application in "crypto/elliptic/p224.go". A remote attacker can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

18) Out-of-bounds write

EUVDB-ID: #VU30165

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-15358

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

19) Input validation error

EUVDB-ID: #VU29539

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-13776

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to systemd mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

20) Integer overflow

EUVDB-ID: #VU28227

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-13434

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow within the sqlite3_str_vappendf() function in printf.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and crash the application.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

21) Buffer overflow

EUVDB-ID: #VU46905

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-8927

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

22) Improper Check for Certificate Revocation

EUVDB-ID: #VU48895

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-8286

CWE-ID: CWE-299 - Improper Check for Certificate Revocation

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to incorrectly implemented checks for OCSP stapling. A remote attacker can provide a fraudulent OCSP response that would appear fine, instead of the real one.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

23) Uncontrolled Recursion

EUVDB-ID: #VU48894

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-8285

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due tu uncontrolled recursion when processing FTP responses within the wildcard matching functionality, which allows a callback (set with <a href="https://curl.se/libcurl/c/CURLOPT_CHUNK_BGN_FUNCTION.html">CURLOPT_CHUNK_BGN_FUNCTION</a>) to return information back to libcurl on how to handle a specific entry in a directory when libcurl iterates over a list of all available entries. A remote attacker who controls the malicious FTP server can trick the victim to connect to it and crash the application, which is using the affected libcurl version.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

24) Information disclosure

EUVDB-ID: #VU48893

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-8284

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the way cURL handles PASV responses. A remote attacker with control over malicious FTP server can use the PASV response to trick curl into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

25) Expired pointer dereference

EUVDB-ID: #VU45794

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-8231

CWE-ID: CWE-825 - Expired pointer dereference

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to expired pointer dereference error for CURLOPT_CONNECT_ONLY connections that may lead to information disclosure. If the application is using the CURLOPT_CONNECT_ONLY option to check if the website is accessible, an attacker might abuse this feature and force the application to re-use expired connection and send data intended to another connection to attacker controlled server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

26) Out-of-bounds read

EUVDB-ID: #VU50329

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-25013

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in GNU C Library within the iconv feature when processing multi-byte input sequences in the EUC-KR encoding. A remote attacker can pass specially crafted input to the application, trigger out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

27) Out-of-bounds read

EUVDB-ID: #VU17859

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-9169

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or gain access to sensitive information.

The vulnerability exists due to heap-based buffer over-read via an attempted case-insensitive regular-expression match. A remote attacker can perform a denial of service attack or gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

28) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU18153

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-3842

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to pam_systemd creates a user session using environmental parameters. A local user can spoof an active session and gain additional PolicyKit privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

29) Incorrect default permissions

EUVDB-ID: #VU54338

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-2708

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to crash the service.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can cause a denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

30) Off-by-one

EUVDB-ID: #VU15954

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2017-14502

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to off-by-one error for UTF-16 names in RAR archives. A remote attacker can trigger an out-of-bounds read in archive_read_format_rar_read_header and cause the service to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

31) Input validation error

EUVDB-ID: #VU54337

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2016-10228

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenShift Jaeger: 1.17.0 - 1.17.8


CPE2.3 External links

http://access.redhat.com/errata/RHSA-2021:2532

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###