The default configuration in the Red Hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2014-0516.html | Third Party Advisory |
http://secunia.com/advisories/59533 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2255-1 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1039812 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0516.html | Third Party Advisory |
http://secunia.com/advisories/59533 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2255-1 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1039812 | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2014-0516.html - Third Party Advisory | |
References | () http://secunia.com/advisories/59533 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2255-1 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1039812 - Third Party Advisory |
Information
Published : 2014-06-02 15:55
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6433
Mitre link : CVE-2013-6433
CVE.ORG link : CVE-2013-6433
JSON object : View
Products Affected
canonical
- ubuntu_linux
openstack
- neutron
CWE
CWE-264
Permissions, Privileges, and Access Controls