First published: Fri Apr 04 2014(Updated: )
Barclamp (aka barclamp-network) 1.7 for the Crowbar Framework, as used in SUSE Cloud 3, does not enable netfilter on bridges when creating new instances, which allows remote attackers to bypass security group restrictions via unspecified vectors, related to floating IPs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Crowbar Barclamp | =1.7 | |
novell SUSE Cloud | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0592 is considered a moderate severity vulnerability that allows remote attackers to bypass security group restrictions.
To fix CVE-2014-0592, ensure that netfilter is enabled on bridges when creating new instances in the Crowbar Framework.
The impact of CVE-2014-0592 is the potential unauthorized access to network resources due to insufficient firewalling.
CVE-2014-0592 affects Crowbar Barclamp version 1.7 and SUSE Cloud 3.0.
Yes, CVE-2014-0592 is exploitable remotely as it allows attackers to bypass firewall restrictions.