CVE-2018-10912

Impact:
Moderate
Public Date:
2018-05-25
CWE:
CWE-835
Bugzilla:
1607624: CVE-2018-10912 keycloak: infinite loop in session replacement leading to denial of service

The MITRE CVE dictionary describes this issue as:

keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.

Find out more about CVE-2018-10912 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 4.4
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity High
Privileges Required High
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Single Sign-On 7.2 RHSA-2018:2428 2018-08-15

Affected Packages State

Platform Package State
Red Hat Single Sign-On 7 keycloak Affected
Red Hat OpenShift Application Runtimes 1.0 springboot Under investigation
Red Hat OpenShift Application Runtimes 1.0 swarm Under investigation
Red Hat Mobile Application Platform On-Premise 4 keycloak Under investigation
Red Hat JBoss Fuse 7 keycloak Under investigation

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.