Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4497

Опубликовано: 05 нояб. 2013
Источник: debian
EPSS Низкий

Описание

The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
novafixed2013.2-1package
novanot-affectedwheezypackage

Примечания

  • https://bugs.launchpad.net/nova/+bug/1073306

  • https://github.com/openstack/nova/commit/ba0d007fb78bd1182c3c0b808dbd7ccc84640e80

  • https://bugs.launchpad.net/nova/+bug/1202266

  • https://github.com/openstack/nova/commit/5cced7a6dd32d231c606e25dbf762d199bf9cca7

EPSS

Процентиль: 29%
0.00106
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.

redhat
почти 13 лет назад

The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.

nvd
почти 12 лет назад

The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.

github
около 3 лет назад

OpenStack Compute Nova Improper Access Control

EPSS

Процентиль: 29%
0.00106
Низкий