First published: Tue Jan 05 2016(Updated: )
HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eucalyptus | =3.4.0 | |
Eucalyptus | =3.4.1 | |
Eucalyptus | =3.4.2 | |
Eucalyptus | =3.4.3 | |
Eucalyptus | =4.0.0 | |
Eucalyptus | =4.0.1 | |
Eucalyptus | =4.0.2 | |
Eucalyptus | =4.1.0 | |
Eucalyptus | =4.1.1 | |
Eucalyptus | =4.1.2 | |
Eucalyptus | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6861 has been classified with a medium severity due to its potential impact on IAM role permissions.
To fix CVE-2015-6861, you should upgrade to a version of HPE Helion Eucalyptus that is higher than 4.2.0.
CVE-2015-6861 affects users of HPE Helion Eucalyptus versions 3.4.0 through 4.2.0.
CVE-2015-6861 allows remote authenticated users to bypass security measures for assuming IAM roles.
CVE-2015-6861 was publicly disclosed in October 2015.