Executive Summary
Summary | |
---|---|
Title | Keystone vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2002-1 | First vendor Publication | 2013-10-23 |
Vendor | Ubuntu | Last vendor Modification | 2013-10-23 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 - Ubuntu 12.10 Summary: Keystone would improperly grant access to invalid tokens under certain circumstances. Software Description: - keystone: OpenStack identity service Details: Chmouel Boudjnah discovered that Keystone did not properly invalidate user tokens when a tenant was disabled which allowed an authenticated user to retain access via the token. (CVE-2013-4222) Kieran Spear discovered that Keystone did not properly verify PKI tokens when performing revocation when using the memcache and KVS backends. An authenticated attacker could exploit this to bypass intended access restrictions. (CVE-2013-4294) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: Ubuntu 12.10: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2002-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-522 | Insufficiently Protected Credentials (CWE/SANS Top 25) |
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19297 | |||
Oval ID: | oval:org.mitre.oval:def:19297 | ||
Title: | USN-2002-1 -- keystone vulnerabilities | ||
Description: | Keystone would improperly grant access to invalid tokens under certain circumstances. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2002-1 CVE-2013-4222 CVE-2013-4294 | Version: | 5 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 | Product(s): | keystone |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-24 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2002-1.nasl - Type : ACT_GATHER_INFO |
2013-09-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-16551.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:02:40 |
|
2013-10-24 00:18:48 |
|