First published: Fri Mar 15 2013(Updated: )
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | >=2012.2<2012.2.4 | 2012.2.4 |
OpenStack Folsom | =2012.2 | |
Ubuntu Linux | =12.10 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1865 is classified as a moderate severity vulnerability.
You can fix CVE-2013-1865 by upgrading to Keystone version 2012.2.4 or later.
CVE-2013-1865 affects OpenStack Keystone Folsom (2012.2) and related packages.
Yes, CVE-2013-1865 can be exploited remotely by attackers using revoked PKI tokens.
CVE-2013-1865 is an access control vulnerability related to token revocation checks.