7 High
AI Score
Confidence
Low
3.5 Low
CVSS2
Access Vector
Access Complexity
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
56.4%
Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
rhn.redhat.com/errata/RHSA-2015-1909.html
www.openwall.com/lists/oss-security/2015/09/08/9
access.redhat.com/errata/RHSA-2015:1909
access.redhat.com/security/cve/CVE-2015-5240
bugs.launchpad.net/neutron/+bug/1489111
bugzilla.redhat.com/show_bug.cgi?id=1258458
github.com/advisories/GHSA-hhpj-6pj7-wpx5
github.com/openstack/neutron/commit/767cea23de44a963c6793ffe30ea5c6827d27a38
github.com/openstack/neutron/commit/bbca973986fdc99eae9d1b2545e8246c0b2be2e2
github.com/openstack/neutron/commit/fdc3431ccd219accf6a795079d9b67b8656eed8e
nvd.nist.gov/vuln/detail/CVE-2015-5240
security.openstack.org/ossa/OSSA-2015-018.html