Vulnerability Description
The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Neutron | >= 2014.1, <= 2014.1.2 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2014-1339.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2014-1339.htmlVendor Advisory
FAQ
What is CVE-2014-3632?
CVE-2014-3632 is a vulnerability with a CVSS score of 7.6 (HIGH). The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allo...
How severe is CVE-2014-3632?
CVE-2014-3632 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3632?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Neutron.