Executive Summary
Summary | |
---|---|
Title | OpenStack Swift vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1887-1 | First vendor Publication | 2013-06-20 |
Vendor | Ubuntu | Last vendor Modification | 2013-06-20 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: Multiple security issues were fixed in OpenStack Swift. Software Description: - swift: OpenStack distributed virtual object store Details: Sebastian Krahmer discovered that Swift used the loads function in the pickle Python module when it was configured to use memcached. A remote attacker on the same network as memcached could exploit this to execute arbitrary code. This update adds a new memcache_serialization_support option to support secure json serialization. For details on this new option, please see /usr/share/doc/swift-proxy/memcache.conf-sample. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-4406) Alex Gaynor discovered that Swift did not safely generate XML. An attacker could potentially craft an account name to generate arbitrary XML responses to trigger vulnerabilties in software parsing Swift's XML. (CVE-2013-2161) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: Ubuntu 12.10: Ubuntu 12.04 LTS: After a standard system update you need to restart Swift to make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1887-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-502 | Deserialization of Untrusted Data |
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:16764 | |||
Oval ID: | oval:org.mitre.oval:def:16764 | ||
Title: | USN-1887-1 -- OpenStack Swift vulnerabilities | ||
Description: | Multiple security issues were fixed in OpenStack Swift. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1887-1 CVE-2012-4406 CVE-2013-2161 | Version: | 7 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.04 Ubuntu 12.10 | Product(s): | python-swift |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-10-19 | Name : Fedora Update for openstack-swift FEDORA-2012-15642 File : nvt/gb_fedora_2012_15642_openstack-swift_fc17.nasl |
2012-10-09 | Name : Fedora Update for openstack-swift FEDORA-2012-15098 File : nvt/gb_fedora_2012_15098_openstack-swift_fc16.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-557.nasl - Type : ACT_GATHER_INFO |
2013-08-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2737.nasl - Type : ACT_GATHER_INFO |
2013-06-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1887-1.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-15642.nasl - Type : ACT_GATHER_INFO |
2012-10-08 | Name : The remote Fedora host is missing a security update. File : fedora_2012-15098.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:02:11 |
|
2013-08-21 13:21:55 |
|
2013-06-20 05:18:36 |
|