First published: Fri Dec 26 2014(Updated: )
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eucalyptus | =3.3.0 | |
Eucalyptus | =3.3.1 | |
Eucalyptus | =3.3.2 | |
Eucalyptus | =3.4.0 | |
Eucalyptus | =3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4769 has a severity rating that indicates it may allow remote attackers to perform a denial of service through traffic amplification.
To fix CVE-2013-4769, upgrade your Eucalyptus installation to version 3.4.2 or later.
CVE-2013-4769 affects Eucalyptus versions 3.3.0, 3.3.1, 3.3.2, 3.4.0, and 3.4.1.
CVE-2013-4769 is a remote vulnerability that can be exploited by attackers from outside the network.
The impact of CVE-2013-4769 is potential denial of service, which can disrupt the functioning of affected systems.