Show plain JSON{"containers": {"cna": {"affected": [{"product": "Kubernetes", "vendor": "Kubernetes", "versions": [{"status": "affected", "version": "v1.0.x"}, {"status": "affected", "version": "v1.1.x"}, {"status": "affected", "version": "v1.2.x"}, {"status": "affected", "version": "v1.3.x"}, {"status": "affected", "version": "v1.4.x"}, {"status": "affected", "version": "v1.5.x"}, {"status": "affected", "version": "v1.6.x"}, {"status": "affected", "version": "v1.7.x"}, {"status": "affected", "version": "v1.8.x"}, {"status": "affected", "version": "v1.9.x"}, {"status": "affected", "version": "v1.10.x"}, {"lessThan": "v1.11.8", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "v1.12.6", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "v1.13.4", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Reported by Carl Henrik Lunde"}], "dateAssigned": "2019-01-15T00:00:00", "descriptions": [{"lang": "en", "value": "In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type \"json-patch\" (e.g. `kubectl patch --type json` or `\"Content-Type: application/json-patch+json\"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server."}], "metrics": [{"cvssV3_0": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-10-29T20:06:17", "orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "shortName": "dwf"}, "references": [{"name": "107290", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/107290"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://groups.google.com/forum/#%21topic/kubernetes-announce/vmUUNkYfG9g"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/kubernetes/kubernetes/issues/74534"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://security.netapp.com/advisory/ntap-20190416-0002/"}, {"name": "RHSA-2019:1851", "tags": ["vendor-advisory", "x_refsource_REDHAT"], "url": "https://access.redhat.com/errata/RHSA-2019:1851"}, {"name": "RHSA-2019:3239", "tags": ["vendor-advisory", "x_refsource_REDHAT"], "url": "https://access.redhat.com/errata/RHSA-2019:3239"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve-assign@distributedweaknessfiling.org", "DATE_ASSIGNED": "2019-01-15", "ID": "CVE-2019-1002100", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Kubernetes", "version": {"version_data": [{"version_affected": "=", "version_value": "v1.0.x"}, {"version_affected": "=", "version_value": "v1.1.x"}, {"version_affected": "=", "version_value": "v1.2.x"}, {"version_affected": "=", "version_value": "v1.3.x"}, {"version_affected": "=", "version_value": "v1.4.x"}, {"version_affected": "=", "version_value": "v1.5.x"}, {"version_affected": "=", "version_value": "v1.6.x"}, {"version_affected": "=", "version_value": "v1.7.x"}, {"version_affected": "=", "version_value": "v1.8.x"}, {"version_affected": "=", "version_value": "v1.9.x"}, {"version_affected": "=", "version_value": "v1.10.x"}, {"version_affected": "<", "version_value": "v1.11.8"}, {"version_affected": "<", "version_value": "v1.12.6"}, {"version_affected": "<", "version_value": "v1.13.4"}]}}]}, "vendor_name": "Kubernetes"}]}}, "credit": ["Reported by Carl Henrik Lunde"], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type \"json-patch\" (e.g. `kubectl patch --type json` or `\"Content-Type: application/json-patch+json\"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server."}]}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Uncontrolled Resource Consumption"}]}]}, "references": {"reference_data": [{"name": "107290", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107290"}, {"name": "https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g"}, {"name": "https://github.com/kubernetes/kubernetes/issues/74534", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/74534"}, {"name": "https://security.netapp.com/advisory/ntap-20190416-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190416-0002/"}, {"name": "RHSA-2019:1851", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1851"}, {"name": "RHSA-2019:3239", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3239"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T03:00:19.258Z"}, "title": "CVE Program Container", "references": [{"name": "107290", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/107290"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://groups.google.com/forum/#%21topic/kubernetes-announce/vmUUNkYfG9g"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/kubernetes/kubernetes/issues/74534"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://security.netapp.com/advisory/ntap-20190416-0002/"}, {"name": "RHSA-2019:1851", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"], "url": "https://access.redhat.com/errata/RHSA-2019:1851"}, {"name": "RHSA-2019:3239", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"], "url": "https://access.redhat.com/errata/RHSA-2019:3239"}]}]}, "cveMetadata": {"assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "assignerShortName": "dwf", "cveId": "CVE-2019-1002100", "datePublished": "2019-04-01T14:14:27", "dateReserved": "2019-04-01T00:00:00", "dateUpdated": "2024-08-05T03:00:19.258Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}