Show plain JSON{"affected_release": [{"advisory": "RHSA-2018:1593", "cpe": "cpe:/a:redhat:openstack:10::el7", "package": "openstack-tripleo-heat-templates-0:5.3.10-1.el7ost", "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", "release_date": "2018-05-17T00:00:00Z"}, {"advisory": "RHSA-2018:1593", "cpe": "cpe:/a:redhat:openstack:10::el7", "package": "puppet-tripleo-0:5.6.8-6.el7ost", "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", "release_date": "2018-05-17T00:00:00Z"}, {"advisory": "RHSA-2018:1627", "cpe": "cpe:/a:redhat:openstack:11::el7", "package": "openstack-tripleo-heat-templates-0:6.2.12-2.el7ost", "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", "release_date": "2018-05-18T00:00:00Z"}, {"advisory": "RHSA-2018:1627", "cpe": "cpe:/a:redhat:openstack:11::el7", "package": "puppet-tripleo-0:6.5.10-3.el7ost", "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", "release_date": "2018-05-18T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "instack-undercloud-0:7.4.12-1.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "openstack-tripleo-common-0:7.6.13-3.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "openstack-tripleo-heat-templates-0:7.0.12-8.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "openstack-tripleo-image-elements-0:7.0.5-1.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "openstack-tripleo-puppet-elements-0:7.0.7-1.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "os-net-config-0:7.3.6-1.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-aodh-0:11.4.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-ceilometer-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-ceph-0:2.4.2-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-cinder-0:11.5.0-4.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-glance-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-heat-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-ironic-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-keystone-0:11.4.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-manila-0:11.4.0-4.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-mistral-0:11.4.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-neutron-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-nova-0:11.5.0-4.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-panko-0:11.5.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-tripleo-0:7.4.12-8.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "puppet-trove-0:11.4.0-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "python-novajoin-0:1.0.17-3.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "python-os-brick-0:1.15.5-2.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2331", "cpe": "cpe:/a:redhat:openstack:12::el7", "package": "python-tripleoclient-0:7.3.10-3.el7ost", "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", "release_date": "2018-08-20T00:00:00Z"}, {"advisory": "RHSA-2018:2857", "cpe": "cpe:/a:redhat:openstack-director:8::el7", "package": "instack-undercloud-0:2.2.7-13.el7ost", "product_name": "Red Hat OpenStack Platform 8.0 (Liberty) director", "release_date": "2018-10-02T00:00:00Z"}, {"advisory": "RHSA-2018:2857", "cpe": "cpe:/a:redhat:openstack-director:8::el7", "package": "openstack-tripleo-heat-templates-0:0.8.14-42.el7ost", "product_name": "Red Hat OpenStack Platform 8.0 (Liberty) director", "release_date": "2018-10-02T00:00:00Z"}, {"advisory": "RHBA-2018:2140", "cpe": "cpe:/a:redhat:openstack-director:9::el7", "package": "instack-undercloud-0:4.0.0-18.el7ost", "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka) director", "release_date": "2018-07-05T00:00:00Z"}, {"advisory": "RHBA-2018:2140", "cpe": "cpe:/a:redhat:openstack-director:9::el7", "package": "openstack-tripleo-heat-templates-0:2.0.0-65.el7ost", "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka) director", "release_date": "2018-07-05T00:00:00Z"}], "bugzilla": {"description": "memcached: UDP server support allows spoofed traffic amplification DoS", "id": "1551182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551182"}, "csaw": false, "cvss3": {"cvss3_base_score": "5.3", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "status": "verified"}, "details": ["Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.", "It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amplification distributed denial of service (DDoS) attacks. A remote attacker could send a malicious UDP request using a spoofed source IP address of a target system to memcached, causing it to send a significantly larger response to the target."], "mitigation": {"lang": "en:us", "value": "Please refer to the Red Hat Knowledgebase article 3369081 for instructions on how to properly secure memcached installations to prevent them from being used in an attack.\nhttps://access.redhat.com/solutions/3369081"}, "name": "CVE-2018-1000115", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Will not fix", "package_name": "memcached", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Will not fix", "package_name": "memcached", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "memcached", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/a:redhat:openstack:7", "fix_state": "Will not fix", "package_name": "memcached", "product_name": "Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)"}, {"cpe": "cpe:/a:redhat:mobile_application_platform:4", "fix_state": "Will not fix", "package_name": "rhmap-memcached-docker", "product_name": "Red Hat Mobile Application Platform 4"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Affected", "package_name": "memcached", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:8", "fix_state": "Affected", "package_name": "memcached", "product_name": "Red Hat OpenStack Platform 8 (Liberty)"}, {"cpe": "cpe:/a:redhat:openstack:9", "fix_state": "Affected", "package_name": "memcached", "product_name": "Red Hat OpenStack Platform 9 (Mitaka)"}], "public_date": "2018-03-02T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-1000115\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-1000115"], "statement": "Red Hat is aware of traffic amplification distributed denial of service (DDoS) attacks that take advantage of the insecurely configured memcached servers reachable from the public Internet. The default configuration of memcached as shipped in Red Hat products makes it possible to abuse them for these DDoS attacks if memcached is exposed to connections from the public Internet. Refer to the Red Hat Knowledgebase article 3369081 for instructions on how to properly secure memcached installations to prevent them from being used in the attack.\nhttps://access.redhat.com/solutions/3369081", "threat_severity": "Moderate"}