First published: Wed Sep 04 2013(Updated: )
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | >=2012.2.0<2013.1.4 | 2013.1.4 |
OpenStack keystonemiddleware | =2012.2 | |
OpenStack keystonemiddleware | =2012.2.1 | |
OpenStack keystonemiddleware | =2012.2.2 | |
OpenStack keystonemiddleware | =2012.2.3 | |
OpenStack keystonemiddleware | =2012.2.4 | |
OpenStack keystonemiddleware | =2013.1 | |
OpenStack keystonemiddleware | =2013.1.1 | |
OpenStack keystonemiddleware | =2013.1.2 | |
OpenStack keystonemiddleware | =2013.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4294 is considered a critical vulnerability as it allows remote attackers to bypass access restrictions using revoked PKI tokens.
To fix CVE-2013-4294, upgrade your OpenStack Keystone to version 2013.1.4 or later.
CVE-2013-4294 affects OpenStack Keystone versions 2012.2.x up to 2012.2.4 and 2013.1 up to 2013.1.3.
CVE-2013-4294 enables an attacker to bypass intended access restrictions using revoked PKI tokens.
Yes, CVE-2013-4294 relates to improper handling of PKI token revocation in OpenStack Identity (Keystone).