Vulnerability CVE-2018-14635


Published: 2018-09-10   Modified: 2018-09-11

Description:
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Redhat -> Openstack 
Openstack -> Neutron 

 References:
https://access.redhat.com/errata/RHSA-2018:2710
https://access.redhat.com/errata/RHSA-2018:2715
https://access.redhat.com/errata/RHSA-2018:2721
https://access.redhat.com/errata/RHSA-2018:3792
https://bugs.launchpad.net/neutron/+bug/1757482
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635
https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d

Copyright 2024, cxsecurity.com

 

Back to Top