Denial of service in Keylime



Published: 2022-11-15
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-3500
CWE-ID CWE-388
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
keylime
Server applications / Other server solutions

Vendor Keylime

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Error Handling

EUVDB-ID: #VU69339

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3500

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling when treating system level failures, such as network driver crash, causing the verifier component to quit and not recover. The verifier's state machine remains in "verified" state and the associated database is no longer updated for this agent.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

keylime: 2.0 - 6.5.0

External links

http://bugzilla.redhat.com/show_bug.cgi?id=2135343


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###