Описание
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-1842
- https://access.redhat.com/errata/RHSA-2015:0789
- https://access.redhat.com/errata/RHSA-2015:0791
- https://access.redhat.com/errata/RHSA-2015:0830
- https://access.redhat.com/errata/RHSA-2015:0831
- https://access.redhat.com/errata/RHSA-2015:0832
- https://access.redhat.com/security/cve/CVE-2015-1842
- https://bugzilla.redhat.com/show_bug.cgi?id=1201875
- http://rhn.redhat.com/errata/RHSA-2015-0789.html
- http://rhn.redhat.com/errata/RHSA-2015-0791.html
- http://rhn.redhat.com/errata/RHSA-2015-0830.html
- http://rhn.redhat.com/errata/RHSA-2015-0831.html
- http://rhn.redhat.com/errata/RHSA-2015-0832.html
- http://www.securityfocus.com/bid/74049
EPSS
CVE ID
Связанные уязвимости
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.
Уязвимость платформы облачных сервисов Openstack, позволяющая нарушителю выполнить произвольные команды
EPSS