CVE-2017-14696

SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2017-10/msg00073.html Issue Tracking Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2017-10/msg00075.html Issue Tracking Release Notes Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500742 Issue Tracking Release Notes Third Party Advisory
https://docs.saltstack.com/en/latest/topics/releases/2016.11.8.html Issue Tracking Release Notes Vendor Advisory
https://docs.saltstack.com/en/latest/topics/releases/2016.3.8.html Issue Tracking Release Notes Vendor Advisory
https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html Issue Tracking Release Notes Vendor Advisory
https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.1:rc1:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.1:rc2:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.3:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.4:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.5:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.6:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.7:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2017.7.0:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2017.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2017.7.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-10-24 17:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-14696

Mitre link : CVE-2017-14696

CVE.ORG link : CVE-2017-14696


JSON object : View

Products Affected

saltstack

  • salt
CWE
CWE-20

Improper Input Validation