CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
66.2%
Vijaya Erukala discovered that Keystone did not properly invalidate
EC2-style credentials such that if credentials were removed from a tenant,
an authenticated and authorized user using those credentials may still be
allowed access beyond the account owner’s expectations. (CVE-2012-5571)
It was discovered that Keystone did not properly implement token
expiration. A remote attacker could use this to continue to access an
account that is disabled or has a changed password. This issue was
previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu 12.10.
(CVE-2012-5563)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.10 | noarch | python-keystone | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone-doc | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | python-keystone | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |
Ubuntu | 12.04 | noarch | keystone | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |
Ubuntu | 12.04 | noarch | keystone-doc | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |