6.5 Medium
AI Score
Confidence
Low
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.004 Low
EPSS
Percentile
72.4%
The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | neutron | < 2:21.0.0-7 | neutron_2:21.0.0-7_all.deb |
Debian | 11 | all | neutron | < 2:17.2.1-0+deb11u1 | neutron_2:17.2.1-0+deb11u1_all.deb |
Debian | 10 | all | neutron | < 2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1 | neutron_2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1_all.deb |
Debian | 999 | all | neutron | < 2:24.0.0-2 | neutron_2:24.0.0-2_all.deb |
Debian | 13 | all | neutron | < 2:24.0.0-2 | neutron_2:24.0.0-2_all.deb |