First published: Thu Mar 02 2017(Updated: )
A design flaw issue was found in the Red Hat OpenStack Platform director use of TripleO to enable libvirtd based live-migration. Libvirtd is deployed by default (by director) listening on 0.0.0.0 (all interfaces) with no-authentication or encryption. Anyone able to make a TCP connection to any compute host IP address, including 127.0.0.1, other loopback interface addresses, or in some cases possibly addresses that have been exposed beyond the management interface, could use this to open a virsh session to the libvirtd instance and gain control of virtual machine instances or possibly take over the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack | =7.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-2637 is classified as critical due to the potential for unauthorized access to sensitive data.
To fix CVE-2017-2637, you should configure libvirtd to listen only on the localhost interface and implement authentication and encryption.
CVE-2017-2637 affects Red Hat OpenStack versions 7.0, 8, 9, and 10.
Exploitation of CVE-2017-2637 could allow an attacker to gain unauthorized control over live migrations of virtual machines.
Yes, a patch is available and can be applied through Red Hat's errata for the affected OpenStack versions.