Executive Summary

Summary
Title OpenStack Swift vulnerabilities
Informations
Name USN-1887-1 First vendor Publication 2013-06-20
Vendor Ubuntu Last vendor Modification 2013-06-20
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS

Summary:

Multiple security issues were fixed in OpenStack Swift.

Software Description: - swift: OpenStack distributed virtual object store

Details:

Sebastian Krahmer discovered that Swift used the loads function in the pickle Python module when it was configured to use memcached. A remote attacker on the same network as memcached could exploit this to execute arbitrary code. This update adds a new memcache_serialization_support option to support secure json serialization. For details on this new option, please see /usr/share/doc/swift-proxy/memcache.conf-sample. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-4406)

Alex Gaynor discovered that Swift did not safely generate XML. An attacker could potentially craft an account name to generate arbitrary XML responses to trigger vulnerabilties in software parsing Swift's XML. (CVE-2013-2161)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.04:
python-swift 1.8.0-0ubuntu1.2

Ubuntu 12.10:
python-swift 1.7.4-0ubuntu2.2

Ubuntu 12.04 LTS:
python-swift 1.4.8-0ubuntu2.2

After a standard system update you need to restart Swift to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1887-1
CVE-2012-4406, CVE-2013-2161

Package Information:
https://launchpad.net/ubuntu/+source/swift/1.8.0-0ubuntu1.2
https://launchpad.net/ubuntu/+source/swift/1.7.4-0ubuntu2.2
https://launchpad.net/ubuntu/+source/swift/1.4.8-0ubuntu2.2

Original Source

Url : http://www.ubuntu.com/usn/USN-1887-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-502 Deserialization of Untrusted Data
50 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16764
 
Oval ID: oval:org.mitre.oval:def:16764
Title: USN-1887-1 -- OpenStack Swift vulnerabilities
Description: Multiple security issues were fixed in OpenStack Swift.
Family: unix Class: patch
Reference(s): usn-1887-1
CVE-2012-4406
CVE-2013-2161
Version: 7
Platform(s): Ubuntu 13.04
Ubuntu 12.04
Ubuntu 12.10
Product(s): python-swift
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 1
Application 24
Application 1
Application 1
Application 1
Application 1
Os 1
Os 1
Os 2

OpenVAS Exploits

Date Description
2012-10-19 Name : Fedora Update for openstack-swift FEDORA-2012-15642
File : nvt/gb_fedora_2012_15642_openstack-swift_fc17.nasl
2012-10-09 Name : Fedora Update for openstack-swift FEDORA-2012-15098
File : nvt/gb_fedora_2012_15098_openstack-swift_fc16.nasl

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-557.nasl - Type : ACT_GATHER_INFO
2013-08-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2737.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1887-1.nasl - Type : ACT_GATHER_INFO
2012-10-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-15642.nasl - Type : ACT_GATHER_INFO
2012-10-08 Name : The remote Fedora host is missing a security update.
File : fedora_2012-15098.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 12:02:11
  • Multiple Updates
2013-08-21 13:21:55
  • Multiple Updates
2013-06-20 05:18:36
  • First insertion