CVE-2014-3520

Impact:
Important
Public Date:
2014-07-02
CWE:
CWE-863
Bugzilla:
1112668: CVE-2014-3520 openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id
A flaw was found in the way keystone handled trusts. A trustee could use an out-of-scope project ID to gain unauthorized access to a project if the trustor had the required roles for that requested project.

Find out more about CVE-2014-3520 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 3.5
Base Metrics AV:N/AC:M/Au:S/C:P/I:N/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 3.0 (openstack-keystone) RHSA-2014:0994 2014-07-31
Red Hat Enterprise Linux OpenStack Platform 4.0 (openstack-keystone) RHSA-2014:0994 2014-07-31

Affected Packages State

Platform Package State
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) openstack-keystone Affected

Acknowledgements

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Jamie Lennox from Red Hat as the original reporter.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.