First published: Tue Dec 10 2013(Updated: )
Kashyap Chamarthy <kchamart> reports: It's possible for Neutron (OpenStack networking) users to pass arbitrary config files via rootwrap[*] which allows privilege escalation by letting user add more exec directories, change configurations of commands using rootwrap, log more than what needs to be done, etc.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-neutron-2013.2.2 | <5 | 5 |
OpenStack Neutron | >=2013.1<=2013.2.3 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6433 is classified as a critical vulnerability due to its potential for privilege escalation.
To mitigate CVE-2013-6433, upgrade to the latest version of OpenStack Neutron that is not affected by this vulnerability.
CVE-2013-6433 affects users of OpenStack Neutron versions from 2013.1 to 2013.2.2.
CVE-2013-6433 can facilitate privilege escalation attacks by allowing users to manipulate configurations of rootwrap.
Yes, CVE-2013-6433 impacts OpenStack Neutron installations on Ubuntu versions 13.10 and 14.04.