The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/55960 - Vendor Advisory | |
References | () http://secunia.com/advisories/60284 - | |
References | () http://support.citrix.com/article/CTX140989 - | |
References | () http://www.securityfocus.com/bid/69432 - | |
References | () http://www.securitytracker.com/id/1030762 - | |
References | () https://blogs.apache.org/cloudstack/entry/cve_2013_6398_cloudstack_virtual - Vendor Advisory | |
References | () https://issues.apache.org/jira/browse/CLOUDSTACK-5263 - |
Information
Published : 2014-01-15 16:08
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6398
Mitre link : CVE-2013-6398
CVE.ORG link : CVE-2013-6398
JSON object : View
Products Affected
apache
- cloudstack
CWE
CWE-264
Permissions, Privileges, and Access Controls