Splunk response to Path Traversal vulnerability in Splunk Hadoop Connect App
Advisory ID: SP-CAAAPC3
CVE ID: -
Published: 2015-11-19
Last Update: 2015-11-19
CVSSv3.1 Score: -, Medium
CVSSv3.1 Vector: -
CWE: -
Bug ID: SPL-106324
Description
Splunk Enterprise 6.2.7 addresses one vulnerability.
- Denial of Service in KV Store (SPL-106324)
At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2 (CVSS v2).
Affected Products and Components
- Denial of Service in KV Store (SPL-106324)
- Affected Product Versions: Splunk Enterprise 6.2.x before 6.2.7
- Affected Components: All Splunk Enterprise components with KV Store running
- Unaffected Components: Universal Forwarders
Mitigation and Upgrades
Denial of Service in KV Store (SPL-106324)
In Search Head Clustering, the KV Store network port is exposed by default. A system administrator can restrict access to the KV Store (tcp/8191) to other members of the Search Head Cluster by leveraging OS firewall technologies. In other configurations of Splunk Enterprise, the port is only bound to loopback interfaces and exposed to local users.
Splunk recommends upgrading to the latest release and applying relevant Hardening Standards from the Securing Splunk documentation. Splunk Enterprise releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.
Vulnerability Descriptions and Ratings
Denial of Service in KV Store (SPL-106324)
Description: Splunk Enterprise 6.2.x before 6.2.7 permit an unauthenticated attacker to crash the KV Store with specifically crafted data (CVE-2015-1609).
CVSS Severity (version 2.0):
CVSS Base Score 5.0
CVSS Impact Subscore 2.9
CVSS Exploitability Subscore 10
Overall CVSS Score 5.0
Document History
- 2015-Nov-19: Rev 1. Initial Release