This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 2013-07-31
Product Openstack Last view 2023-05-12
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* 68
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* 59
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* 42
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:* 40
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* 40
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* 40
cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* 37
cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:* 24
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:* 24
cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:* 13
cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:* 11
cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:* 10
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openstack:16.2:*:*:*:*:*:*:* 3
cpe:2.3:a:redhat:openstack:-:*:*:*:*:*:*:* 3
cpe:2.3:a:redhat:openstack:2.1:*:*:*:*:*:*:* 2
cpe:2.3:a:redhat:openstack:2.0:*:*:*:*:*:*:* 2
cpe:2.3:a:redhat:openstack:1:*:*:*:*:*:*:* 2
cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:* 2
cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.5 2023-05-12 CVE-2023-2088

A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.

5.5 2023-03-23 CVE-2022-3146

A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.

5.5 2023-03-23 CVE-2022-3101

A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.

2.8 2023-03-06 CVE-2022-4134

A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.

5.9 2023-01-18 CVE-2022-3100

A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.

8.8 2022-12-21 CVE-2022-38065

A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges.

6.5 2022-07-22 CVE-2022-1655

An Incorrect Permission Assignment for Critical Resource flaw was found in Horizon on Red Hat OpenStack. Horizon session cookies are created without the HttpOnly flag despite HorizonSecureCookies being set to true in the environmental files, possibly leading to a loss of confidentiality and integrity.

4.3 2022-03-23 CVE-2021-4180

An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.

8.8 2022-03-04 CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

5.5 2022-03-03 CVE-2021-3620

A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

6.5 2022-02-18 CVE-2021-3930

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

8.1 2022-02-18 CVE-2020-25717

A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

5.9 2022-02-18 CVE-2016-2124

A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

7.5 2021-05-06 CVE-2021-31918

A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.

7.5 2021-03-18 CVE-2020-27827

A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

6.6 2020-10-07 CVE-2020-14355

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.

5 2020-08-31 CVE-2020-14364

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

7.5 2020-08-07 CVE-2020-9490

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

6.5 2020-07-09 CVE-2020-10756

An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.

6.5 2020-07-06 CVE-2019-14900

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

6.5 2020-06-26 CVE-2020-10753

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.

5.9 2020-05-22 CVE-2020-10711

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.

5.9 2020-05-15 CVE-2020-1758

A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.

5.5 2020-05-11 CVE-2020-10685

A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.

6.8 2020-04-13 CVE-2020-1759

A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
8% (15) CWE-200 Information Exposure
6% (11) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5% (9) CWE-787 Out-of-bounds Write
5% (9) CWE-20 Improper Input Validation
3% (6) CWE-732 Incorrect Permission Assignment for Critical Resource
3% (6) CWE-264 Permissions, Privileges, and Access Controls
3% (6) CWE-190 Integer Overflow or Wraparound
3% (6) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (5) CWE-772 Missing Release of Resource after Effective Lifetime
2% (5) CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli...
2% (5) CWE-310 Cryptographic Issues
2% (4) CWE-532 Information Leak Through Log Files
2% (4) CWE-399 Resource Management Errors
2% (4) CWE-125 Out-of-bounds Read
2% (4) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
2% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (3) CWE-776 Unrestricted Recursive Entity References in DTDs ('XML Bomb')
1% (3) CWE-617 Reachable Assertion
1% (3) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (3) CWE-287 Improper Authentication
1% (3) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
1% (2) CWE-770 Allocation of Resources Without Limits or Throttling
1% (2) CWE-668 Exposure of Resource to Wrong Sphere
1% (2) CWE-552 Files or Directories Accessible to External Parties
1% (2) CWE-426 Untrusted Search Path

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:17329 Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attack...
oval:org.mitre.oval:def:18807 USN-2000-1 -- nova vulnerabilities
oval:org.mitre.oval:def:20734 USN-2061-1 -- keystone vulnerability
oval:org.mitre.oval:def:24757 USN-2208-2 -- quantum vulnerability
oval:org.mitre.oval:def:24624 USN-2208-1 -- cinder vulnerability
oval:org.mitre.oval:def:22031 DSA-2850-1 libyaml - heap-based buffer overflow
oval:org.mitre.oval:def:21878 USN-2098-1 -- libyaml vulnerability
oval:org.mitre.oval:def:24291 DSA-2870-1 libyaml-libyaml-perl - heap-based buffer overflow
oval:org.mitre.oval:def:29226 DSA-2850-2 -- libyaml -- heap-based buffer overflow
oval:org.mitre.oval:def:26107 USN-2311-1 -- python-pycadf vulnerability
oval:org.mitre.oval:def:26638 USN-2311-2 -- ceilometer vulnerability
oval:org.mitre.oval:def:26106 USN-2321-1 -- neutron vulnerabilities
oval:org.mitre.oval:def:28246 USN-2406-1 -- OpenStack Keystone vulnerability
oval:org.mitre.oval:def:28233 USN-2407-1 -- OpenStack Nova vulnerabilities
oval:org.mitre.oval:def:27770 USN-2405-1 -- OpenStack Cinder vulnerabilities
oval:org.mitre.oval:def:29063 DSA-3259-1 qemu -- qemu
oval:org.mitre.oval:def:29004 ELSA-2015-0998 -- Oracle qemu-kvm_qemu-guest-agent
oval:org.mitre.oval:def:28974 ELSA-2015-1002 -- Oracle xen
oval:org.mitre.oval:def:28949 ELSA-2015-1003 -- Oracle kvm-83
oval:org.mitre.oval:def:28937 CESA-2015:1002 -- centos 5 xen
oval:org.mitre.oval:def:28912 CESA-2015:0998 -- centos 6 qemu-kvm,qemu-guest-agent
oval:org.mitre.oval:def:28893 ELSA-2015-0999 -- Oracle qemu-kvm
oval:org.mitre.oval:def:28702 RHSA-2015:0998-01 -- Redhat qemu-kvm, qemu-guest-agent
oval:org.mitre.oval:def:28600 CESA-2015:0999 -- centos 7 qemu-kvm,libcacard
oval:org.mitre.oval:def:28539 RHSA-2015:1002-01 -- Redhat xen

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0202 Citrix XenServer Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0061343
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337
2015-A-0112 Oracle Linux & Virtualization Buffer Overflow Vulnerability
Severity: Category I - VMSKEY: V0060735
2015-A-0115 QEMU Virtual Floppy Drive Controller (FDC) Buffer Overflow Vulnerability
Severity: Category II - VMSKEY: V0060741

Snort® IPS/IDS

Date Description
2020-03-19 RabbitMQ X-Reason HTTP header denial-of-service attempt
RuleID : 53109 - Type : SERVER-OTHER - Revision : 1
2018-10-09 Memcached DDoS attempt
RuleID : 47726 - Type : SERVER-OTHER - Revision : 1
2018-10-09 Memcached DDoS attempt
RuleID : 47725 - Type : SERVER-OTHER - Revision : 1
2018-10-09 Memcached DDoS attempt
RuleID : 47724 - Type : SERVER-OTHER - Revision : 1
2018-04-12 Memcached DDoS reflective attempt
RuleID : 45942 - Type : SERVER-OTHER - Revision : 1
2016-10-25 Multiple SQL products privilege escalation attempt
RuleID : 40254 - Type : SERVER-MYSQL - Revision : 2
2016-10-25 Multiple SQL products privilege escalation attempt
RuleID : 40253 - Type : SERVER-MYSQL - Revision : 2
2016-04-26 Redis lua script integer overflow attempt
RuleID : 38313 - Type : SERVER-OTHER - Revision : 2
2016-04-26 Redis lua script integer overflow attempt
RuleID : 38312 - Type : SERVER-OTHER - Revision : 2
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34488 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34487 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34486 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34485 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34484 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34483 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34482 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34481 - Type : OS-OTHER - Revision : 4
2015-06-09 Red Hat OpenStack default password login attempt
RuleID : 34345 - Type : POLICY-OTHER - Revision : 3

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2019-1001.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-00e90783d2.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-1a6e6196b9.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-1d2bc76093.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2513b888a4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-28f30efaf6.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2c965abb15.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-39cc0bc342.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-54a5bcc7e4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5d1f7bd2d7.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-615705632d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6243646704.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-74fb8b257b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-77e610115a.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-83bbd0c22f.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-87f2ace20d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9695e9b0ed.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-af82e7c863.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-bf292e6cdf.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-cce0e0bd04.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO