First published: Tue Sep 17 2013(Updated: )
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jclouds.api:eucalyptus | <3.3.1 | 3.3.1 |
Eucalyptus | <=3.3.0 | |
Eucalyptus | =1.0 | |
Eucalyptus | =1.1 | |
Eucalyptus | =1.2 | |
Eucalyptus | =1.3 | |
Eucalyptus | =1.4 | |
Eucalyptus | =1.5.1 | |
Eucalyptus | =1.5.2 | |
Eucalyptus | =1.6 | |
Eucalyptus | =1.6.2 | |
Eucalyptus | =2.0 | |
Eucalyptus | =2.0.0 | |
Eucalyptus | =2.0.1 | |
Eucalyptus | =2.0.2 | |
Eucalyptus | =2.0.3 | |
Eucalyptus | =3.0 | |
Eucalyptus | =3.0.1 | |
Eucalyptus | =3.1.0 | |
Eucalyptus | =3.1.1 | |
Eucalyptus | =3.1.2 | |
Eucalyptus | =3.2.0 | |
Eucalyptus | =3.2.1 | |
Eucalyptus | =3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4766 is classified with a high severity level due to the potential for unauthorized remote access to sensitive log files.
To fix CVE-2013-4766, upgrade Eucalyptus to version 3.3.1 or later.
CVE-2013-4766 affects various versions of Eucalyptus software prior to 3.3.1.
Yes, CVE-2013-4766 can potentially lead to data breaches as it allows remote attackers to read sensitive log files.
There are no known effective workarounds for CVE-2013-4766; upgrading is recommended as the only solution.