Lucene search

K
ubuntuUbuntuUSN-1641-1
HistoryNov 28, 2012 - 12:00 a.m.

OpenStack Keystone vulnerabilities

2012-11-2800:00:00
ubuntu.com
37

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

AI Score

6.1

Confidence

Low

EPSS

0.003

Percentile

66.2%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04

Packages

  • keystone - OpenStack identity service

Details

Vijaya Erukala discovered that Keystone did not properly invalidate
EC2-style credentials such that if credentials were removed from a tenant,
an authenticated and authorized user using those credentials may still be
allowed access beyond the account owner’s expectations. (CVE-2012-5571)

It was discovered that Keystone did not properly implement token
expiration. A remote attacker could use this to continue to access an
account that is disabled or has a changed password. This issue was
previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu 12.10.
(CVE-2012-5563)

OSVersionArchitecturePackageVersionFilename
Ubuntu12.10noarchpython-keystone< 2012.2-0ubuntu1.2UNKNOWN
Ubuntu12.10noarchkeystone< 2012.2-0ubuntu1.2UNKNOWN
Ubuntu12.10noarchkeystone-doc< 2012.2-0ubuntu1.2UNKNOWN
Ubuntu12.04noarchpython-keystone< 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3UNKNOWN
Ubuntu12.04noarchkeystone< 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3UNKNOWN
Ubuntu12.04noarchkeystone-doc< 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3UNKNOWN

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

AI Score

6.1

Confidence

Low

EPSS

0.003

Percentile

66.2%