Access Restriction Bypass Affecting nova package, versions <2013.2-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-NOVA-351773
  • published5 Nov 2013
  • disclosed5 Nov 2013

Introduced: 5 Nov 2013

CVE-2013-4497  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:unstable nova to version 2013.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nova package and not the nova package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.

CVSS Scores

version 3.1