{
  "threat_severity" : "Moderate",
  "public_date" : "2018-07-09T12:00:00Z",
  "bugzilla" : {
    "description" : "ceph: cephx protocol is vulnerable to replay attack",
    "id" : "1575866",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1575866"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-294",
  "details" : [ "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to the ceph cluster network who is also able to sniff packets on the network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service." ],
  "statement" : "Red Hat OpenStack Platform ships the flawed package, however RHOSP deployments use the ceph package directly from the Ceph channel.  A RHOSP ceph update will therefore not be provided at this time, but please ensure that the underlying Red Hat Ceph Storage is updated.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 2.5",
    "release_date" : "2018-07-26T00:00:00Z",
    "advisory" : "RHSA-2018:2261",
    "cpe" : "cpe:/a:redhat:ceph_storage:2::el7",
    "package" : "ceph-2:10.2.10-28.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 2.5",
    "release_date" : "2018-07-26T00:00:00Z",
    "advisory" : "RHSA-2018:2261",
    "cpe" : "cpe:/a:redhat:ceph_storage:2::el7",
    "package" : "ceph-ansible-0:3.0.39-1.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 2 for Ubuntu",
    "release_date" : "2018-07-26T00:00:00Z",
    "advisory" : "RHSA-2018:2274",
    "cpe" : "cpe:/a:redhat:ceph_storage:2::ubuntu16.04",
    "package" : "ceph"
  }, {
    "product_name" : "Red Hat Ceph Storage 3.0",
    "release_date" : "2018-07-11T00:00:00Z",
    "advisory" : "RHSA-2018:2177",
    "cpe" : "cpe:/a:redhat:ceph_storage:3::el7",
    "package" : "ceph-2:12.2.4-30.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 3.0",
    "release_date" : "2018-07-11T00:00:00Z",
    "advisory" : "RHSA-2018:2177",
    "cpe" : "cpe:/a:redhat:ceph_storage:3::el7",
    "package" : "ceph-ansible-0:3.0.39-1.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 3.0",
    "release_date" : "2018-07-11T00:00:00Z",
    "advisory" : "RHSA-2018:2177",
    "cpe" : "cpe:/a:redhat:ceph_storage:3::el7",
    "package" : "cephmetrics-0:1.0.1-1.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 3.0",
    "release_date" : "2018-07-11T00:00:00Z",
    "advisory" : "RHSA-2018:2177",
    "cpe" : "cpe:/a:redhat:ceph_storage:3::el7",
    "package" : "nfs-ganesha-0:2.5.5-6.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 3 for Ubuntu",
    "release_date" : "2018-07-11T00:00:00Z",
    "advisory" : "RHSA-2018:2179",
    "cpe" : "cpe:/a:redhat:ceph_storage:3::ubuntu16.04",
    "package" : "ceph"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 1.3",
    "fix_state" : "Will not fix",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:1.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "ceph-common",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens)",
    "fix_state" : "Will not fix",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:13"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-1128\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-1128" ],
  "name" : "CVE-2018-1128",
  "csaw" : false
}