First published: Fri Nov 07 2014(Updated: )
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eucalyptus | =3.0 | |
Eucalyptus | =3.0.1 | |
Eucalyptus | =3.1.0 | |
Eucalyptus | =3.1.1 | |
Eucalyptus | =3.1.2 | |
Eucalyptus | =3.2.0 | |
Eucalyptus | =3.2.1 | |
Eucalyptus | =3.2.2 | |
Eucalyptus | =3.3.0 | |
Eucalyptus | =3.3.1 | |
Eucalyptus | =3.3.2 | |
Eucalyptus | =3.4.0 | |
Eucalyptus | =3.4.1 | |
Eucalyptus | =3.4.2 | |
Eucalyptus | =3.4.3 | |
Eucalyptus | =4.0.0 | |
Eucalyptus | =4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5038 has a medium severity rating due to its potential to expose sensitive information.
To fix CVE-2014-5038, update Eucalyptus to version 4.0.2 or later, which addresses the logging issue.
CVE-2014-5038 affects Eucalyptus versions from 3.0.0 to 4.0.1.
CVE-2014-5038 exposes user and system passwords in cloud log files.
Yes, local users can exploit CVE-2014-5038 by reading the affected log files to obtain sensitive information.