First published: Tue Jan 14 2014(Updated: )
The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CloudStack | <=4.2.0 | |
Apache CloudStack | =2.0 | |
Apache CloudStack | =2.0.1 | |
Apache CloudStack | =2.1.0 | |
Apache CloudStack | =2.1.1 | |
Apache CloudStack | =2.1.2 | |
Apache CloudStack | =2.1.3 | |
Apache CloudStack | =2.1.4 | |
Apache CloudStack | =2.1.5 | |
Apache CloudStack | =2.1.6 | |
Apache CloudStack | =2.1.7 | |
Apache CloudStack | =2.1.8 | |
Apache CloudStack | =2.1.9 | |
Apache CloudStack | =2.1.10 | |
Apache CloudStack | =2.2.0 | |
Apache CloudStack | =2.2.1 | |
Apache CloudStack | =2.2.2 | |
Apache CloudStack | =2.2.3 | |
Apache CloudStack | =2.2.5 | |
Apache CloudStack | =2.2.6 | |
Apache CloudStack | =2.2.7 | |
Apache CloudStack | =2.2.8 | |
Apache CloudStack | =2.2.9 | |
Apache CloudStack | =2.2.11 | |
Apache CloudStack | =2.2.12 | |
Apache CloudStack | =2.2.13 | |
Apache CloudStack | =2.2.14 | |
Apache CloudStack | =3.0.0 | |
Apache CloudStack | =3.0.1 | |
Apache CloudStack | =3.0.2 | |
Apache CloudStack | =4.0.0-incubating | |
Apache CloudStack | =4.0.1 | |
Apache CloudStack | =4.0.2 | |
Apache CloudStack | =4.1.0 | |
Apache CloudStack | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.