Ubuntu 12.04 LTS / 12.10 : keystone vulnerabilities (USN-1641-1)

Ubuntu Security Notice (C) 2012-2013 Canonical, Inc. / NASL script (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Vijaya Erukala discovered that Keystone did not properly invalidate
EC2-style credentials such that if credentials were removed from a
tenant, an authenticated and authorized user using those credentials
may still be allowed access beyond the account owner's expectations.
(CVE-2012-5571)

It was discovered that Keystone did not properly implement token
expiration. A remote attacker could use this to continue to access an
account that is disabled or has a changed password. This issue was
previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu
12.10. (CVE-2012-5563).

Solution :

Update the affected python-keystone package.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)
CVSS Temporal Score : 4.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 63093 ()

Bugtraq ID: 56726
56727

CVE ID: CVE-2012-3426
CVE-2012-5563
CVE-2012-5571