Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3517

Опубликовано: 07 авг. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests.

РелизСтатусПримечание
devel

not-affected

1:2014.2~b2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:2014.1.2-0ubuntu1.1]]
lucid

DNE

precise

not-affected

trusty

released

1:2014.1.2-0ubuntu1.1
trusty/esm

DNE

trusty was released [1:2014.1.2-0ubuntu1.1]
upstream

released

2014.1.1-8,2014.1.2

Показывать по

EPSS

Процентиль: 60%
0.00398
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests.

nvd
больше 11 лет назад

api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests.

debian
больше 11 лет назад

api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2 ...

github
больше 3 лет назад

OpenStack Compute (Nova) Exposure of Sensitive Information to an Unauthorized Actor vulnerability

EPSS

Процентиль: 60%
0.00398
Низкий

4.3 Medium

CVSS2