Vulnerability CVE-2013-2167


Published: 2019-12-10

Description:
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass

Type:

CWE-345

(Insufficient Verification of Data Authenticity)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Redhat -> Openstack 
Openstack -> Python-keystoneclient 
Debian -> Debian linux 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html
http://rhn.redhat.com/errata/RHSA-2013-0992.html
http://www.openwall.com/lists/oss-security/2013/06/19/5
http://www.securityfocus.com/bid/60680
https://access.redhat.com/security/cve/cve-2013-2167
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167
https://exchange.xforce.ibmcloud.com/vulnerabilities/85492
https://security-tracker.debian.org/tracker/CVE-2013-2167

Copyright 2024, cxsecurity.com

 

Back to Top