The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/60284 | third party advisory |
http://secunia.com/advisories/55960 | third party advisory vendor advisory |
https://issues.apache.org/jira/browse/CLOUDSTACK-5263 | |
https://blogs.apache.org/cloudstack/entry/cve_2013_6398_cloudstack_virtual | vendor advisory |
http://www.securityfocus.com/bid/69432 | vdb entry |
http://www.securitytracker.com/id/1030762 | vdb entry |
http://support.citrix.com/article/CTX140989 |