First published: Thu Jun 21 2012(Updated: )
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Compute | =2012.2 | |
Openstack Diablo | =2011.3 | |
OpenStack Essex | =2012.1 | |
pip/nova | <12.0.0a0 | 12.0.0a0 |
=2012.2 | ||
=2011.3 | ||
=2012.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2654 is considered a medium severity vulnerability due to its potential to allow remote attackers to bypass security restrictions.
To fix CVE-2012-2654, upgrade the OpenStack Compute (Nova) to version 12.0.0a0 or later.
CVE-2012-2654 affects OpenStack Compute versions 2012.2 (Folsom), 2012.1 (Essex), and 2011.3 (Diablo).
CVE-2012-2654 can facilitate unauthorized access by allowing attackers to bypass security group restrictions.
Users and administrators of OpenStack Compute versions 2011.3, 2012.1, and 2012.2 may be impacted by CVE-2012-2654.