Apache

Mesos

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 25.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:28

A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to...

  • EPSS 3.32%
  • Veröffentlicht 05.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:02

When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can theref...

Exploit
  • EPSS 53.41%
  • Veröffentlicht 11.02.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:24

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types ...

  • EPSS 0.22%
  • Veröffentlicht 09.01.2019 23:29:02
  • Zuletzt bearbeitet 21.11.2024 03:40:02

An improper authorization vulnerability exists in Jenkins Mesos Plugin 0.17.1 and earlier in MesosCloud.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.

  • EPSS 0.33%
  • Veröffentlicht 09.01.2019 23:29:02
  • Zuletzt bearbeitet 21.11.2024 03:40:02

An improper authorization vulnerability exists in Jenkins Mesos Plugin 0.17.1 and earlier in MesosCloud.java that allows attackers with Overall/Read access to initiate a test connection to an attacker-specified Mesos server with attacker-specified cr...

  • EPSS 2.49%
  • Veröffentlicht 21.09.2018 13:29:01
  • Zuletzt bearbeitet 21.11.2024 04:13:06

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in th...

  • EPSS 0.75%
  • Veröffentlicht 13.09.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:38

When parsing a malformed JSON payload, libprocess in Apache Mesos versions 1.4.0 to 1.5.0 might crash due to an uncaught exception. Parsing chunked HTTP requests with trailers can lead to a libprocess crash too because of the mistakenly planted asser...

  • EPSS 3.23%
  • Veröffentlicht 29.09.2017 01:34:50
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When handling a decoding failure for a malformed URL path of an HTTP request, libprocess in Apache Mesos before 1.1.3, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.0-dev might crash because the code accidentally calls inappropriate function. A mal...

  • EPSS 2.14%
  • Veröffentlicht 29.09.2017 01:34:50
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When handling a libprocess message wrapped in an HTTP request, libprocess in Apache Mesos before 1.1.3, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.0-dev crashes if the request path is empty, because the parser assumes the request path always sta...