Lucene search

K
ubuntuUbuntuUSN-2002-1
HistoryOct 23, 2013 - 12:00 a.m.

Keystone vulnerabilities

2013-10-2300:00:00
ubuntu.com
34

6 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.9%

Releases

  • Ubuntu 13.04
  • Ubuntu 12.10

Packages

  • keystone - OpenStack identity service

Details

Chmouel Boudjnah discovered that Keystone did not properly invalidate user
tokens when a tenant was disabled which allowed an authenticated user to
retain access via the token. (CVE-2013-4222)

Kieran Spear discovered that Keystone did not properly verify PKI tokens
when performing revocation when using the memcache and KVS backends. An
authenticated attacker could exploit this to bypass intended access
restrictions. (CVE-2013-4294)

OSVersionArchitecturePackageVersionFilename
Ubuntu13.04noarchpython-keystone< 1:2013.1.3-0ubuntu1.1UNKNOWN
Ubuntu13.04noarchkeystone< 1:2013.1.3-0ubuntu1.1UNKNOWN
Ubuntu13.04noarchkeystone-doc< 1:2013.1.3-0ubuntu1.1UNKNOWN
Ubuntu12.10noarchpython-keystone< 2012.2.4-0ubuntu3.2UNKNOWN
Ubuntu12.10noarchkeystone< 2012.2.4-0ubuntu3.2UNKNOWN
Ubuntu12.10noarchkeystone-doc< 2012.2.4-0ubuntu3.2UNKNOWN

6 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.9%