CVE-2014-3476

Related Vulnerabilities: CVE-2014-3476  

A flaw was found in keystone's chained delegation. A trustee able to create a delegation from a trust or an OAuth token could misuse identity impersonation to bypass the enforced scope, possibly allowing them to obtain elevated privileges to the trustor's projects and roles.

A flaw was found in keystone's chained delegation. A trustee able to create a delegation from a trust or an OAuth token could misuse identity impersonation to bypass the enforced scope, possibly allowing them to obtain elevated privileges to the trustor's projects and roles.

Find out more about CVE-2014-3476 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.9
Base Metrics AV:N/AC:M/Au:S/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 3.0 (openstack-keystone) RHSA-2014:0994 2014-07-31
Red Hat Enterprise Linux OpenStack Platform 4.0 (openstack-keystone) RHSA-2014:0994 2014-07-31

Affected Packages State

Platform Package State
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) openstack-keystone Affected

Acknowledgements

This issue was discovered by Steven Hardy of Red Hat.