Impact: Low Public Date: 2019-03-03 CWE: CWE-20 Bugzilla: 1690745: CVE-2019-9735 openstack-neutron: incorrect validation of port settings in iptables security group driver An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2019-9735 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 3.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | None |
Availability Impact | Low |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 9.0 | openstack-neutron | Affected |
Red Hat OpenStack Platform 8.0 (Liberty) | openstack-neutron | Affected |
Red Hat OpenStack Platform 14.0 (Rocky) | openstack-neutron | Affected |
Red Hat OpenStack Platform 13.0 (Queens) | openstack-neutron | Affected |
Red Hat OpenStack Platform 12.0 | opentack-neutron | Affected |
Red Hat OpenStack Platform 10 | openstack-neutron | Affected |