First published: Tue Sep 17 2013(Updated: )
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eucalyptus Eucalyptus | <=3.3.0 | |
Eucalyptus Eucalyptus | =1.0 | |
Eucalyptus Eucalyptus | =1.1 | |
Eucalyptus Eucalyptus | =1.2 | |
Eucalyptus Eucalyptus | =1.3 | |
Eucalyptus Eucalyptus | =1.4 | |
Eucalyptus Eucalyptus | =1.5.1 | |
Eucalyptus Eucalyptus | =1.5.2 | |
Eucalyptus Eucalyptus | =1.6 | |
Eucalyptus Eucalyptus | =1.6.2 | |
Eucalyptus Eucalyptus | =2.0 | |
Eucalyptus Eucalyptus | =2.0.0 | |
Eucalyptus Eucalyptus | =2.0.1 | |
Eucalyptus Eucalyptus | =2.0.2 | |
Eucalyptus Eucalyptus | =2.0.3 | |
Eucalyptus Eucalyptus | =3.0 | |
Eucalyptus Eucalyptus | =3.0.1 | |
Eucalyptus Eucalyptus | =3.1.0 | |
Eucalyptus Eucalyptus | =3.1.1 | |
Eucalyptus Eucalyptus | =3.1.2 | |
Eucalyptus Eucalyptus | =3.2.0 | |
Eucalyptus Eucalyptus | =3.2.1 | |
Eucalyptus Eucalyptus | =3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.