First published: Tue Apr 15 2014(Updated: )
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | <8.0.0a0 | 8.0.0a0 |
OpenStack keystonemiddleware | =2013.1 | |
OpenStack keystonemiddleware | =2013.1.1 | |
OpenStack keystonemiddleware | =2013.1.2 | |
OpenStack keystonemiddleware | =2013.1.3 | |
OpenStack keystonemiddleware | =2013.2 | |
OpenStack keystonemiddleware | =2013.2.1 | |
OpenStack keystonemiddleware | =2013.2.2 | |
OpenStack keystonemiddleware | =2013.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2828 is considered a denial of service vulnerability, as it allows remote attackers to cause CPU consumption.
To fix CVE-2014-2828, upgrade to Keystone version 2013.2.4 or later.
CVE-2014-2828 affects OpenStack Keystone versions 2013.1 up to 2013.2.3.
Yes, CVE-2014-2828 can be exploited remotely by sending a large number of the same authentication methods in a request.
CVE-2014-2828 involves an authentication chaining attack that leads to denial of service.