Vulnerability Description
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Compute | 2013.1 |
| Openstack | Folsom | - |
| Openstack | Grizzly | 2013.1 |
| Openstack | Havana | havana-1 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html
- http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.htmlPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2013/05/09/2
- https://bugs.launchpad.net/nova/+bug/1174608
- https://bugzilla.redhat.com/show_bug.cgi?id=958285
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html
- http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.htmlPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2013/05/09/2
- https://bugs.launchpad.net/nova/+bug/1174608
- https://bugzilla.redhat.com/show_bug.cgi?id=958285
FAQ
What is CVE-2013-2030?
CVE-2013-2030 is a vulnerability with a CVSS score of 2.1 (LOW). keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-...
How severe is CVE-2013-2030?
CVE-2013-2030 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2030?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Compute, Openstack Folsom, Openstack Grizzly, Openstack Havana.