First published: Tue Oct 29 2013(Updated: )
Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/nova | <12.0.0a0 | 12.0.0a0 |
OpenStack Compute | >=2013.1<2013.1.3 | |
OpenStack Compute | >=2013.2<2013.2.3 | |
Red Hat OpenStack for IBM Power | =3.0 | |
OpenStack Compute (Nova) | >=2013.1<2013.1.3 | |
OpenStack Compute (Nova) | >=2013.2<2013.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4185 has a medium severity rating due to its potential to cause denial of service.
To resolve CVE-2013-4185, upgrade the OpenStack Compute (Nova) package to version 12.0.0a0 or later.
CVE-2013-4185 affects OpenStack Compute (Nova) versions prior to 2013.1.3 and 2013.2.3.
Yes, CVE-2013-4185 can be exploited by remote authenticated users.
CVE-2013-4185 can lead to high nova-network consumption, resulting in potential denial of service.