CVE-2014-7144

Impact:
Moderate
Public Date:
2014-08-06
CWE:
CWE-295
Bugzilla:
1143808: CVE-2014-7144 python-keystoneclient: TLS certificate verification disabled
It was found that python-keystoneclient treated all settings in paste.ini files as string types. If the "insecure" option were set to any value in a paste.ini configuration file, it would be evaluated as true, resulting in TLS connections being vulnerable to man-in-the-middle attacks.

Find out more about CVE-2014-7144 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 (python-keystoneclient) RHSA-2014:1783 2014-11-03
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (python-keystoneclient) RHSA-2014:1784 2014-11-03
Red Hat Enterprise Linux OpenStack Platform 4.0 (python-keystoneclient) RHSA-2015:0020 2015-01-08

Affected Packages State

Platform Package State
Red Hat Gluster Storage 3.0 python-keystoneclient Will not fix
Red Hat Gluster Storage 2.1 python-keystoneclient Will not fix

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.