Executive Summary
Summary | |
---|---|
Title | Eucalyptus vulnerability |
Informations | |||
---|---|---|---|
Name | USN-1137-1 | First vendor Publication | 2011-05-26 |
Vendor | Ubuntu | Last vendor Modification | 2011-05-26 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: An attacker could send crafted input to Eucalyptus to run commands as a valid user. Software Description: - eucalyptus: Elastic Utility Computing Architecture - rampart: Apache web services security engine Details: Juraj Somorovsky, Jorg Schwenk, Meiko Jensen and Xiaofeng Lou discovered that Eucalyptus did not properly validate SOAP requests. An unauthenticated remote attacker could exploit this to submit arbitrary commands to the Eucalyptus SOAP interface in the context of an authenticated user. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: Ubuntu 10.10: Ubuntu 10.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1137-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20751 | |||
Oval ID: | oval:org.mitre.oval:def:20751 | ||
Title: | USN-1137-1 -- eucalyptus, rampart vulnerability | ||
Description: | An attacker could send crafted input to Eucalyptus to run commands as a valid user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1137-1 CVE-2011-0730 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 10.10 Ubuntu 10.04 | Product(s): | eucalyptus rampart |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-06-03 | Name : Ubuntu Update for eucalyptus USN-1137-1 File : nvt/gb_ubuntu_USN_1137_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
73462 | Apache Rampart/C util/rampart_timestamp_token.c rampart_timestamp_token_valid... |
73259 | Eucalyptus SOAP Request Signed Element MiTM Arbitrary Command Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1137-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:37 |
|