First published: Thu Jun 02 2011(Updated: )
Eucalyptus before 2.0.3 and Eucalyptus EE before 2.0.2, as used in Ubuntu Enterprise Cloud (UEC) and other products, do not properly interpret signed elements in SOAP requests, which allows man-in-the-middle attackers to execute arbitrary commands by modifying a request, related to an "XML Signature Element Wrapping" or a "SOAP signature replay" issue.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eucalyptus | <2.0.3 | |
Eucalyptus | <2.0.2 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =10.04 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0730 is classified as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2011-0730, upgrade Eucalyptus to version 2.0.3 or later and ensure that you are using updated versions of Ubuntu 10.10, 11.04, or 10.04 LTS.
CVE-2011-0730 affects Eucalyptus versions before 2.0.3 and Eucalyptus EE versions before 2.0.2, along with specific Ubuntu releases.
CVE-2011-0730 enables man-in-the-middle attacks that can result in arbitrary command execution by modifying SOAP request elements.
There are no effective workarounds for CVE-2011-0730, and upgrading is strongly recommended.