First published: Thu Jan 31 2013(Updated: )
Thierry Carrez (thierry) of the OpenStack Project reports: Title: Keystone denial of service through invalid token requests Reporter: Dan Prince (Red Hat) Products: Keystone Affects: All versions Description: Dan Prince of Red Hat reported a vulnerability in token creation error handling in Keystone. By requesting lots of invalid tokens, an unauthenticated user may fill up logs on Keystone API servers disks, potentially resulting in a denial of service attack against Keystone. Proposed patches: See attached patches for current development tree (Grizzly) and the Folsom and Essex series. Unless a flaw is discovered in them, these proposed patches will be merged to Keystone master, stable/folsom and stable/essex branches on the public disclosure date.
Affected Software | Affected Version | How to fix |
---|---|---|
Keystone | <= |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-906171 is classified as a denial of service vulnerability affecting Keystone.
To fix REDHAT-BUG-906171, upgrade to a patched version of OpenStack Keystone that addresses this vulnerability.
All versions of OpenStack Keystone are affected by REDHAT-BUG-906171.
The impact of REDHAT-BUG-906171 is that it may allow an attacker to create a denial of service condition through invalid token requests.
The vulnerability REDHAT-BUG-906171 was reported by Dan Prince of Red Hat.