Executive Summary
Summary | |
---|---|
Title | Nova vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2000-1 | First vendor Publication | 2013-10-23 |
Vendor | Ubuntu | Last vendor Modification | 2013-10-23 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: Nova could be made to crash if it received specially crafted network requests. Software Description: - nova: OpenStack Compute cloud infrastructure Details: It was discovered that Nova did not properly enforce the is_public property when determining flavor access. An authenticated attacker could exploit this to obtain sensitive information in private flavors. This issue only affected Ubuntu 12.10 and 13.10. (CVE-2013-2256, CVE-2013-4278) Grant Murphy discovered that Nova would allow XML entity processing. A remote unauthenticated attacker could exploit this using the Nova API to cause a denial of service via resource exhaustion. This issue only affected Ubuntu 13.10. (CVE-2013-4179) Vishvananda Ishaya discovered that Nova inefficiently handled network security group updates when Nova was configured to use nova-network. An authenticated attacker could exploit this to cause a denial of service. (CVE-2013-4185) Jaroslav Henner discovered that Nova did not properly handle certain inputs to the instance console when Nova was configured to use Apache Qpid. An authenticated attacker could exploit this to cause a denial of service on the compute node running the instance. By default, Ubuntu uses RabbitMQ instead of Qpid. (CVE-2013-4261) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: Ubuntu 12.10: Ubuntu 12.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20130423-e52e6912-0ubuntu1.2 |
Original Source
Url : http://www.ubuntu.com/usn/USN-2000-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-264 | Permissions, Privileges, and Access Controls |
40 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
20 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18807 | |||
Oval ID: | oval:org.mitre.oval:def:18807 | ||
Title: | USN-2000-1 -- nova vulnerabilities | ||
Description: | Nova could be made to crash if it received specially crafted network requests. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2000-1 CVE-2013-2256 CVE-2013-4278 CVE-2013-4179 CVE-2013-4185 CVE-2013-4261 | Version: | 5 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | nova |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-24 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2000-1.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2005-1.nasl - Type : ACT_GATHER_INFO |
2013-09-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-15373.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:02:39 |
|
2013-10-30 13:22:44 |
|
2013-10-24 00:18:47 |
|