#VU41624 Resource management error in etcd


Published: 2020-08-10

Vulnerability identifier: #VU41624

Vulnerability risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-15112

CWE-ID: CWE-399

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
etcd
Server applications / Database software

Vendor: CoreOS

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources with the application, as it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime panic when reading the entry.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

etcd: 3.3.0 - 3.4.9


External links
http://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability