4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
Keystone is a Python implementation of the OpenStack (http://www.openstack.org) identity service API. It was found that Keystone incorrectly handled authorization failures. If a client attempted to change their tenant membership to one they are not authorized to join, Keystone correctly returned a not authorized error; however, the client was still added to the tenant. Users able to access the Keystone administrative API could use this flaw to add any user to any tenant. (CVE-2012-3542) When logging into Keystone, the user receives a token to use for authentication with other services managed by Keystone. It was found that Keystone failed to revoke tokens if privileges were revoked, allowing users to retain access to resources they should no longer be able to access while their token remains valid. (CVE-2012-4413) It was found that the Keystone administrative API was missing authentication for certain actions. Users able to access the Keystone administrative API could use this flaw to add, start, and stop services, as well as list the roles for any user. (CVE-2012-4456) It was found that Keystone incorrectly handled disabled tenants. A user belonging to a disabled tenant could use this flaw to continue accessing resources as if the tenant were not disabled. (CVE-2012-4457) Red Hat would like to thank Dolph Mathews for reporting CVE-2012-3542 and CVE-2012-4413. All users of openstack-keystone are advised to upgrade to these updated packages, which upgrade openstack-keystone to upstream version 2012.1.2 and correct these issues. After installing the updated packages, the Keystone service (openstack-keystone) will be restarted automatically.
CPE | Name | Operator | Version |
---|---|---|---|
openstack-keystone | eq | 2012.1.1__1.el6 | |
openstack-keystone | eq | 2012.1.1__1.el6 |
osvdb.org/85484
secunia.com/advisories/50531
secunia.com/advisories/50590
www.openwall.com/lists/oss-security/2012/09/12/7
www.securityfocus.com/bid/55524
www.ubuntu.com/usn/USN-1564-1
access.redhat.com/errata/RHSA-2012:1378
access.redhat.com/security/cve/CVE-2012-4413
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=855491
exchange.xforce.ibmcloud.com/vulnerabilities/78478
rhn.redhat.com/errata/RHSA-2012-1378.html