CVE-2012-5571

Impact:
Moderate
Public Date:
2012-11-28
Bugzilla:
880399: CVE-2012-5571 OpenStack: Keystone EC2-style credentials invalidation issue

The MITRE CVE dictionary describes this issue as:

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Find out more about CVE-2012-5571 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4
Base Metrics AV:N/AC:L/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
RHOS Essex Release (openstack-keystone) RHSA-2012:1556 2012-12-10
OpenStack Folsom (openstack-keystone) RHSA-2012:1557 2012-12-10

Acknowledgements

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Vijaya Erukala as the original reporter.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.