The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/46808 | third party advisory vendor advisory |
https://review.openstack.org/#/c/8239/ | |
https://github.com/openstack/nova/commit/9f9e9da777161426a6f8cb4314b78e09beac2978 | patch exploit |
https://bugs.launchpad.net/nova/+bug/985184 | patch |
https://github.com/openstack/nova/commit/ff06c7c885dc94ed7c828e8cdbb8b5d850a7e654 | patch exploit |
http://www.ubuntu.com/usn/USN-1466-1 | vendor advisory |
https://lists.launchpad.net/openstack/msg12883.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/76110 | vdb entry |
http://secunia.com/advisories/49439 | third party advisory vendor advisory |