CVE-2016-4383
Find out more about CVE-2016-4383 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 5.7 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | Required |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity Impact | High |
| Availability Impact | None |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat OpenStack Platform 9.0 | openstack-glance | Will not fix |
| Red Hat OpenStack Platform 8.0 (Liberty) | openstack-glance | Will not fix |
| Red Hat OpenStack Platform 12.0 | openstack-glance | Will not fix |
| Red Hat OpenStack Platform 11.0 (Ocata) | openstack-glance | Will not fix |
| Red Hat OpenStack Platform 10 | openstack-glance | Will not fix |
| Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | openstack-glance | Will not fix |
| Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | openstack-glance | Will not fix |
Mitigation
For this flaw to be exploited, both non-admin image upload must be permitted and records of deleted IDs must have been purged from the openstack-glance 'images' database table.
To prevent flaw exploitation:
* Do not allow non-admin users to upload images, or
* If you do permit normal users to upload images, do not purge the 'images' table. Note: It is safe to delete rows from `image_properties`, `image_tags`, `image_members`, and `image_locations` tables.
