Executive Summary

Summary
Title Eucalyptus vulnerability
Informations
Name USN-1137-1 First vendor Publication 2011-05-26
Vendor Ubuntu Last vendor Modification 2011-05-26
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS

Summary:

An attacker could send crafted input to Eucalyptus to run commands as a valid user.

Software Description: - eucalyptus: Elastic Utility Computing Architecture - rampart: Apache web services security engine

Details:

Juraj Somorovsky, Jorg Schwenk, Meiko Jensen and Xiaofeng Lou discovered that Eucalyptus did not properly validate SOAP requests. An unauthenticated remote attacker could exploit this to submit arbitrary commands to the Eucalyptus SOAP interface in the context of an authenticated user.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04:
eucalyptus-cloud 2.0.1+bzr1256-0ubuntu4.1
librampart0 1.3.0-1ubuntu2.1

Ubuntu 10.10:
eucalyptus-cloud 2.0+bzr1241-0ubuntu4.2
librampart0 1.3.0-1ubuntu1.1

Ubuntu 10.04 LTS:
eucalyptus-cloud 1.6.2-0ubuntu30.5
librampart0 1.3.0-0ubuntu7.1

In general, a standard system update will make all the necessary changes.

References:
CVE-2011-0730

Package Information:
https://launchpad.net/ubuntu/+source/eucalyptus/2.0.1+bzr1256-0ubuntu4.1
https://launchpad.net/ubuntu/+source/rampart/1.3.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/eucalyptus/2.0+bzr1241-0ubuntu4.2
https://launchpad.net/ubuntu/+source/rampart/1.3.0-1ubuntu1.1
https://launchpad.net/ubuntu/+source/eucalyptus/1.6.2-0ubuntu30.5
https://launchpad.net/ubuntu/+source/rampart/1.3.0-0ubuntu7.1

Original Source

Url : http://www.ubuntu.com/usn/USN-1137-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-264 Permissions, Privileges, and Access Controls
50 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20751
 
Oval ID: oval:org.mitre.oval:def:20751
Title: USN-1137-1 -- eucalyptus, rampart vulnerability
Description: An attacker could send crafted input to Eucalyptus to run commands as a valid user.
Family: unix Class: patch
Reference(s): USN-1137-1
CVE-2011-0730
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 10.10
Ubuntu 10.04
Product(s): eucalyptus
rampart
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 15
Os 3

OpenVAS Exploits

Date Description
2011-06-03 Name : Ubuntu Update for eucalyptus USN-1137-1
File : nvt/gb_ubuntu_USN_1137_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
73462 Apache Rampart/C util/rampart_timestamp_token.c rampart_timestamp_token_valid...

73259 Eucalyptus SOAP Request Signed Element MiTM Arbitrary Command Execution

Nessus® Vulnerability Scanner

Date Description
2011-06-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1137-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:58:37
  • Multiple Updates