First published: Tue Jan 14 2014(Updated: )
The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CloudStack | <=4.2.0 | |
Apache CloudStack | =2.0 | |
Apache CloudStack | =2.0.1 | |
Apache CloudStack | =2.1.0 | |
Apache CloudStack | =2.1.1 | |
Apache CloudStack | =2.1.2 | |
Apache CloudStack | =2.1.3 | |
Apache CloudStack | =2.1.4 | |
Apache CloudStack | =2.1.5 | |
Apache CloudStack | =2.1.6 | |
Apache CloudStack | =2.1.7 | |
Apache CloudStack | =2.1.8 | |
Apache CloudStack | =2.1.9 | |
Apache CloudStack | =2.1.10 | |
Apache CloudStack | =2.2.0 | |
Apache CloudStack | =2.2.1 | |
Apache CloudStack | =2.2.2 | |
Apache CloudStack | =2.2.3 | |
Apache CloudStack | =2.2.5 | |
Apache CloudStack | =2.2.6 | |
Apache CloudStack | =2.2.7 | |
Apache CloudStack | =2.2.8 | |
Apache CloudStack | =2.2.9 | |
Apache CloudStack | =2.2.11 | |
Apache CloudStack | =2.2.12 | |
Apache CloudStack | =2.2.13 | |
Apache CloudStack | =2.2.14 | |
Apache CloudStack | =3.0.0 | |
Apache CloudStack | =3.0.1 | |
Apache CloudStack | =3.0.2 | |
Apache CloudStack | =4.0.0-incubating | |
Apache CloudStack | =4.0.1 | |
Apache CloudStack | =4.0.2 | |
Apache CloudStack | =4.1.0 | |
Apache CloudStack | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-6398 is considered medium as it allows attackers to bypass firewall restrictions.
To fix CVE-2013-6398, upgrade to Apache CloudStack version 4.2.1 or later.
CVE-2013-6398 affects Apache CloudStack versions before 4.2.1, including versions 2.0, 2.1.x, 2.2.x, 3.0.x, and 4.0.x.
CVE-2013-6398 addresses the problem of the virtual router not preserving source restrictions in firewall rules after a restart.
Yes, CVE-2013-6398 can potentially lead to unauthorized access due to firewall restrictions being bypassed.