6
CVSSv2

CVE-2014-0105

Published: 15/04/2014 Updated: 16/12/2017
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) prior to 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

Vulnerable Product Search on Vulmon Subscribe to Product

openstack python-keystoneclient 0.2.3

openstack python-keystoneclient 0.2.2

openstack python-keystoneclient 0.3.0

openstack python-keystoneclient 0.3.1

openstack python-keystoneclient 0.3.2

openstack python-keystoneclient

openstack python-keystoneclient 0.2.4

Vendor Advisories

Debian Bug report logs - #742898 CVE-2014-0105: Potential context confusion in Keystone middleware Package: python-keystoneclient; Maintainer for python-keystoneclient is Debian OpenStack <team+openstack@trackerdebianorg>; Source for python-keystoneclient is src:python-keystoneclient (PTS, buildd, popcon) Reported by: Thom ...