Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 2013-07-31 |
Product | Openstack | Last view | 2023-05-12 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2023-05-12 | CVE-2023-2088 | A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality. |
5.5 | 2023-03-23 | CVE-2022-3146 | A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment. |
5.5 | 2023-03-23 | CVE-2022-3101 | A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment. |
2.8 | 2023-03-06 | CVE-2022-4134 | A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images. |
5.9 | 2023-01-18 | CVE-2022-3100 | A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API. |
8.8 | 2022-12-21 | CVE-2022-38065 | A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges. |
6.5 | 2022-07-22 | CVE-2022-1655 | An Incorrect Permission Assignment for Critical Resource flaw was found in Horizon on Red Hat OpenStack. Horizon session cookies are created without the HttpOnly flag despite HorizonSecureCookies being set to true in the environmental files, possibly leading to a loss of confidentiality and integrity. |
4.3 | 2022-03-23 | CVE-2021-4180 | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1. |
8.8 | 2022-03-04 | CVE-2021-3656 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. |
5.5 | 2022-03-03 | CVE-2021-3620 | A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality. |
6.5 | 2022-02-18 | CVE-2021-3930 | An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. |
8.1 | 2022-02-18 | CVE-2020-25717 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. |
5.9 | 2022-02-18 | CVE-2016-2124 | A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required. |
7.5 | 2021-05-06 | CVE-2021-31918 | A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality. |
7.5 | 2021-03-18 | CVE-2020-27827 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. |
6.6 | 2020-10-07 | CVE-2020-14355 | Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution. |
5 | 2020-08-31 | CVE-2020-14364 | An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. |
7.5 | 2020-08-07 | CVE-2020-9490 | Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers. |
6.5 | 2020-07-09 | CVE-2020-10756 | An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1. |
6.5 | 2020-07-06 | CVE-2019-14900 | A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. |
6.5 | 2020-06-26 | CVE-2020-10753 | A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue. |
5.9 | 2020-05-22 | CVE-2020-10711 | A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service. |
5.9 | 2020-05-15 | CVE-2020-1758 | A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack. |
5.5 | 2020-05-11 | CVE-2020-10685 | A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble. |
6.8 | 2020-04-13 | CVE-2020-1759 | A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
8% (15) | CWE-200 | Information Exposure |
6% (11) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
5% (9) | CWE-787 | Out-of-bounds Write |
5% (9) | CWE-20 | Improper Input Validation |
3% (6) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
3% (6) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (6) | CWE-190 | Integer Overflow or Wraparound |
3% (6) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
2% (5) | CWE-772 | Missing Release of Resource after Effective Lifetime |
2% (5) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
2% (5) | CWE-310 | Cryptographic Issues |
2% (4) | CWE-532 | Information Leak Through Log Files |
2% (4) | CWE-399 | Resource Management Errors |
2% (4) | CWE-125 | Out-of-bounds Read |
2% (4) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
2% (4) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (3) | CWE-776 | Unrestricted Recursive Entity References in DTDs ('XML Bomb') |
1% (3) | CWE-617 | Reachable Assertion |
1% (3) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (3) | CWE-287 | Improper Authentication |
1% (3) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
1% (2) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (2) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (2) | CWE-552 | Files or Directories Accessible to External Parties |
1% (2) | CWE-426 | Untrusted Search Path |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:17329 | Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attack... |
oval:org.mitre.oval:def:18807 | USN-2000-1 -- nova vulnerabilities |
oval:org.mitre.oval:def:20734 | USN-2061-1 -- keystone vulnerability |
oval:org.mitre.oval:def:24757 | USN-2208-2 -- quantum vulnerability |
oval:org.mitre.oval:def:24624 | USN-2208-1 -- cinder vulnerability |
oval:org.mitre.oval:def:22031 | DSA-2850-1 libyaml - heap-based buffer overflow |
oval:org.mitre.oval:def:21878 | USN-2098-1 -- libyaml vulnerability |
oval:org.mitre.oval:def:24291 | DSA-2870-1 libyaml-libyaml-perl - heap-based buffer overflow |
oval:org.mitre.oval:def:29226 | DSA-2850-2 -- libyaml -- heap-based buffer overflow |
oval:org.mitre.oval:def:26107 | USN-2311-1 -- python-pycadf vulnerability |
oval:org.mitre.oval:def:26638 | USN-2311-2 -- ceilometer vulnerability |
oval:org.mitre.oval:def:26106 | USN-2321-1 -- neutron vulnerabilities |
oval:org.mitre.oval:def:28246 | USN-2406-1 -- OpenStack Keystone vulnerability |
oval:org.mitre.oval:def:28233 | USN-2407-1 -- OpenStack Nova vulnerabilities |
oval:org.mitre.oval:def:27770 | USN-2405-1 -- OpenStack Cinder vulnerabilities |
oval:org.mitre.oval:def:29063 | DSA-3259-1 qemu -- qemu |
oval:org.mitre.oval:def:29004 | ELSA-2015-0998 -- Oracle qemu-kvm_qemu-guest-agent |
oval:org.mitre.oval:def:28974 | ELSA-2015-1002 -- Oracle xen |
oval:org.mitre.oval:def:28949 | ELSA-2015-1003 -- Oracle kvm-83 |
oval:org.mitre.oval:def:28937 | CESA-2015:1002 -- centos 5 xen |
oval:org.mitre.oval:def:28912 | CESA-2015:0998 -- centos 6 qemu-kvm,qemu-guest-agent |
oval:org.mitre.oval:def:28893 | ELSA-2015-0999 -- Oracle qemu-kvm |
oval:org.mitre.oval:def:28702 | RHSA-2015:0998-01 -- Redhat qemu-kvm, qemu-guest-agent |
oval:org.mitre.oval:def:28600 | CESA-2015:0999 -- centos 7 qemu-kvm,libcacard |
oval:org.mitre.oval:def:28539 | RHSA-2015:1002-01 -- Redhat xen |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0202 | Citrix XenServer Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0061343 |
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
2015-A-0112 | Oracle Linux & Virtualization Buffer Overflow Vulnerability Severity: Category I - VMSKEY: V0060735 |
2015-A-0115 | QEMU Virtual Floppy Drive Controller (FDC) Buffer Overflow Vulnerability Severity: Category II - VMSKEY: V0060741 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-03-19 | RabbitMQ X-Reason HTTP header denial-of-service attempt RuleID : 53109 - Type : SERVER-OTHER - Revision : 1 |
2018-10-09 | Memcached DDoS attempt RuleID : 47726 - Type : SERVER-OTHER - Revision : 1 |
2018-10-09 | Memcached DDoS attempt RuleID : 47725 - Type : SERVER-OTHER - Revision : 1 |
2018-10-09 | Memcached DDoS attempt RuleID : 47724 - Type : SERVER-OTHER - Revision : 1 |
2018-04-12 | Memcached DDoS reflective attempt RuleID : 45942 - Type : SERVER-OTHER - Revision : 1 |
2016-10-25 | Multiple SQL products privilege escalation attempt RuleID : 40254 - Type : SERVER-MYSQL - Revision : 2 |
2016-10-25 | Multiple SQL products privilege escalation attempt RuleID : 40253 - Type : SERVER-MYSQL - Revision : 2 |
2016-04-26 | Redis lua script integer overflow attempt RuleID : 38313 - Type : SERVER-OTHER - Revision : 2 |
2016-04-26 | Redis lua script integer overflow attempt RuleID : 38312 - Type : SERVER-OTHER - Revision : 2 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34488 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34487 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34486 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34485 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34484 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34483 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34482 - Type : OS-OTHER - Revision : 4 |
2015-06-23 | QEMU floppy disk controller buffer overflow attempt RuleID : 34481 - Type : OS-OTHER - Revision : 4 |
2015-06-09 | Red Hat OpenStack default password login attempt RuleID : 34345 - Type : POLICY-OTHER - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO |
2019-01-07 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2019-1001.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-00e90783d2.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-1a6e6196b9.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-1d2bc76093.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-2513b888a4.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-28f30efaf6.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-2c965abb15.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-39cc0bc342.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-54a5bcc7e4.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5d1f7bd2d7.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-615705632d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6243646704.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-74fb8b257b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-77e610115a.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-83bbd0c22f.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-87f2ace20d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9695e9b0ed.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-af82e7c863.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-bf292e6cdf.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-cce0e0bd04.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO |