Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6491

Опубликовано: 22 мар. 2013
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 4openstack-novaNot affected
OpenStack 3 for RHEL 6openstack-cinderFixedRHBA-2014:036303.04.2014
OpenStack 3 for RHEL 6openstack-glanceFixedRHBA-2014:036303.04.2014
OpenStack 3 for RHEL 6openstack-quantumFixedRHBA-2014:036303.04.2014
OpenStack 3 for RHEL 6qemu-kvm-rhevFixedRHBA-2014:036303.04.2014
OpenStack 3 for RHEL 6openstack-novaFixedRHSA-2014:011230.01.2014

Показывать по

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 59%
0.00389
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

nvd
около 12 лет назад

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

debian
около 12 лет назад

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo bef ...

github
больше 3 лет назад

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

EPSS

Процентиль: 59%
0.00389
Низкий

5.1 Medium

CVSS2