Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1516183 - (CVE-2017-15535) CVE-2017-15535 mongodb: Invalid wire protocol compression
CVE-2017-15535 mongodb: Invalid wire protocol compression
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170929,repor...
: Security
Depends On: 1516185
Blocks: 1516186
  Show dependency treegraph
 
Reported: 2017-11-22 03:46 EST by Andrej Nemec
Modified: 2018-02-12 04:21 EST (History)
47 users (show)

See Also:
Fixed In Version: mongodb 4.10
Doc Type: If docs needed, set a value
Doc Text:
A memory corruption flaw was found in the way MongoDB handled wire protocol compression for intra-cluster communication. A privileged network attacker could potentially use this flaw to crash the MongoDB server under certain circumstances.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-11-27 00:04:41 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2017-11-22 03:46:52 EST
MongoDB 3.4.x before 3.4.10, and 3.5.x-development, has a disabled-by-default configuration setting, networkMessageCompressors (aka wire protocol compression), which exposes a vulnerability when enabled that could be exploited by a malicious attacker to deny service or modify memory.

Upstream issue:

https://jira.mongodb.org/browse/SERVER-31273

Upstream patch [3.4.x]:

https://github.com/mongodb/mongo/commit/5ad69b851801edadbfde8fdf271f4ba7c21170b5
Comment 1 Andrej Nemec 2017-11-22 03:47:36 EST
Created mongodb tracking bugs for this issue:

Affects: fedora-all [bug 1516185]

Note You need to log in before you can comment on or make changes to this bug.