{
  "threat_severity" : "Moderate",
  "public_date" : "2016-12-08T00:00:00Z",
  "bugzilla" : {
    "description" : "ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request",
    "id" : "1403245",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1403245"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.", "A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 1.3 for Red Hat Enterprise Linux 7",
    "release_date" : "2016-12-21T00:00:00Z",
    "advisory" : "RHSA-2016:2994",
    "cpe" : "cpe:/a:redhat:ceph_storage:1.3::el7",
    "package" : "ceph-1:0.94.9-9.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 1.3 for Ubuntu",
    "release_date" : "2016-12-21T00:00:00Z",
    "advisory" : "RHSA-2016:2995",
    "cpe" : "cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04",
    "package" : "ceph"
  }, {
    "product_name" : "Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7",
    "release_date" : "2016-12-15T00:00:00Z",
    "advisory" : "RHSA-2016:2954",
    "cpe" : "cpe:/a:redhat:ceph_storage:2::el7",
    "package" : "ceph-1:10.2.3-17.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 2 for Ubuntu",
    "release_date" : "2016-12-15T00:00:00Z",
    "advisory" : "RHSA-2016:2956",
    "cpe" : "cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:5::el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6 (Juno)",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6 (Juno) Installer",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack-installer:6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10 (Newton)",
    "fix_state" : "Not affected",
    "package_name" : "puppet-ceph",
    "cpe" : "cpe:/a:redhat:openstack:10"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-9579\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-9579" ],
  "name" : "CVE-2016-9579",
  "csaw" : false
}