HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
References
Link | Resource |
---|---|
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04926463 | Vendor Advisory |
https://www.eucalyptus.com/resources/security/advisories/esa-32 | Vendor Advisory |
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04926463 | Vendor Advisory |
https://www.eucalyptus.com/resources/security/advisories/esa-32 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04926463 - Vendor Advisory | |
References | () https://www.eucalyptus.com/resources/security/advisories/esa-32 - Vendor Advisory |
Information
Published : 2016-01-05 02:59
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5040
Mitre link : CVE-2014-5040
CVE.ORG link : CVE-2014-5040
JSON object : View
Products Affected
eucalyptus
- eucalyptus
CWE
CWE-264
Permissions, Privileges, and Access Controls