Etcd

Etcd

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 22.08.2023 19:16:23
  • Zuletzt bearbeitet 21.11.2024 07:08:49

Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability.

  • EPSS 0.22%
  • Veröffentlicht 11.05.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:02:40

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.26 and 3.5.9, the LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't ha...

  • EPSS 0.44%
  • Veröffentlicht 04.04.2023 15:15:08
  • Zuletzt bearbeitet 18.02.2025 17:15:11

Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.

  • EPSS 0.12%
  • Veröffentlicht 05.08.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:04:50

In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd con...

  • EPSS 0.02%
  • Veröffentlicht 05.08.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:04:50

In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permi...

  • EPSS 0.11%
  • Veröffentlicht 05.08.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:04:49

In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an ex...

  • EPSS 0.74%
  • Veröffentlicht 14.01.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:32

etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Nam...