Lucene search

K
ubuntuUbuntuUSN-1730-1
HistoryFeb 20, 2013 - 12:00 a.m.

OpenStack Keystone vulnerabilities

2013-02-2000:00:00
ubuntu.com
37

9.6 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.09 Low

EPSS

Percentile

94.5%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04

Packages

  • keystone - OpenStack identity service

Details

Nathanael Burton discovered that Keystone did not properly verify disabled
users. An authenticated but disabled user would continue to have access
rights that were removed. (CVE-2013-0282)

Jonathan Murray discovered that Keystone would allow XML entity processing.
A remote unauthenticated attacker could exploit this to cause a denial of
service via resource exhaustion. Authenticated users could also use this to
view arbitrary files on the Keystone server. (CVE-2013-1664, CVE-2013-1665)

OSVersionArchitecturePackageVersionFilename
Ubuntu12.10noarchpython-keystone<Β 2012.2.1-0ubuntu1.2UNKNOWN
Ubuntu12.10noarchkeystone<Β 2012.2.1-0ubuntu1.2UNKNOWN
Ubuntu12.10noarchkeystone-doc<Β 2012.2.1-0ubuntu1.2UNKNOWN
Ubuntu12.04noarchpython-keystone<Β 2012.1+stable~20120824-a16a0ab9-0ubuntu2.5UNKNOWN
Ubuntu12.04noarchkeystone<Β 2012.1+stable~20120824-a16a0ab9-0ubuntu2.5UNKNOWN
Ubuntu12.04noarchkeystone-doc<Β 2012.1+stable~20120824-a16a0ab9-0ubuntu2.5UNKNOWN

9.6 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.09 Low

EPSS

Percentile

94.5%