Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:spi-inc:ganeti:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AFB2A29-9615-40BE-A9D2-5ED10CAD25F5", "versionEndIncluding": "2.9.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F66B137A-661B-4A33-B42D-36086C5CE25F", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CD3870AD-723B-4EE6-B86F-759126E06F21", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0A8CBB01-AA66-4262-A3DF-26DED8E1B243", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F6F8F9E-2942-45A9-A3DF-7A2B3392110C", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E4946A0E-7FAF-49D1-85B7-5CE8A31B9F3D", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C0A6331-D11E-4062-8883-3B0A8661CE20", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "74F1C8B8-9A50-45E5-8CCA-425199DEB994", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1136452D-0A89-4E27-B6FA-F08236885FFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "22D6DAB2-3455-4532-8FC9-FB04DD71B9B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "F038EE62-9261-4D28-BC3C-8692FCA87115", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "35ECC2AA-C63F-4794-A62D-B78ED6F82DD5", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "27853A40-4920-4EAD-B7D7-94F21984F0F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "773D755E-7E1E-460E-A753-9AB5AA67759E", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4B85FCE9-38B9-437D-AA42-A5C258A1D785", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "4806E38C-C58B-4C41-A2BB-D6ABB2A392C1", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB162407-8069-43A6-8F93-492E6EBF17C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "997067C6-82FC-4917-A16C-3E8D7F1DFC77", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "15071497-2E59-4EA1-ACDC-5D6AC2703226", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FA19307-8A03-4161-9A15-BA8C7FD83F3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9A1261E-DC4D-49DA-9667-738D7B50C4AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "53A21A0F-1087-4C50-A9BE-1401C6D2E353", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "5AC8EDA6-66FA-4B10-93BD-75DBB1936890", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF9320F7-7814-4C8D-8B0D-E3C561F241AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CA3195D4-3F38-4233-93BD-9C7B0BD81DEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E1CA193-AB44-4FE1-89EB-F44B4BAE5E8C", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "52293A00-F1A4-4855-B9D3-231CC3F44F14", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "A613785D-35E9-4D04-AA53-ECE74D19416D", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DA3E104-B4F1-4D1F-96EC-3920AA3D947B", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "94BE58DA-8FEB-469A-9357-336EEA5E4C69", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "4814E6BD-E537-4ED5-9E2D-C6C93967B481", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E7081B6-E36F-460D-BD6A-A58190046671", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "91E4AA14-555D-46F1-BFC6-1E7DC241B146", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "79DF3293-D53E-4BA0-AB1D-1F60DDEE4657", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "43DC4920-7456-40C3-8DB3-0131FA8B1E62", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "26181A20-ACF6-4EB4-869D-6B26B7C41783", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF9B2609-E1A3-4835-9F10-A36D377597F3", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4BD26-FCF7-4D80-A303-A265C8C0E5C1", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "3F1246E6-E244-4F8A-AB57-2463BDD83549", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "3009D3B0-1890-4F9D-8B43-29CD245EBCCE", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEB2AE3B-D220-40CA-8945-0D8B17152D39", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "913E97F4-4D88-445D-B0D4-6915F0744793", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "344982DF-20A4-4DB7-A3B7-ACC8A0BEAE32", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "B36F975B-6F6A-43AE-9588-A844A340C0F7", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D2F9BF24-60B1-4334-9082-8F1F251B381A", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B1A19969-A0E2-4FFB-A4AC-AC330F3C89F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "480C9B88-DC61-4586-B714-69751FC233C5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2, when used in SSL mode, allows remote attackers to cause a denial of service (resource consumption) via SSL parameter renegotiation."}, {"lang": "es", "value": "La interfaz de control RESTful (tambi\u00e9n conocida como RAPI o ganeti-rapi) en Ganeti en versiones anteriores a la 2.9.7, 2.10.x en versiones anteriores a la 2.10.8, 2.11.x en versiones anteriores a la 2.11.8, 2.12.x en versiones anteriores a la 2.12.6, 2.13.x en versiones anteriores a la 2.13.3, 2.14.x en versiones anteriores a la 2.14.2, y 2.15.x en versiones anteriores a la 2.15.2, cuando se emplea en modo SSL, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (consumo de recursos) mediante la renegociaci\u00f3n de par\u00e1metros SSL."}], "id": "CVE-2015-7944", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-08-18T17:29:01.170", "references": [{"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3431"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "url": "http://www.ocert.org/advisories/ocert-2015-012.html"}, {"source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/39169/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3431"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "url": "http://www.ocert.org/advisories/ocert-2015-012.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/39169/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}