Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Nathanael Burton discovered that Keystone did not properly verify
disabled users. An authenticated but disabled user would continue to
have access rights that were removed. (CVE-2013-0282)
Jonathan Murray discovered that Keystone would allow XML entity
processing. A remote unauthenticated attacker could exploit this to
cause a denial of service via resource exhaustion. Authenticated users
could also use this to view arbitrary files on the Keystone server.
Update the affected python-keystone package.
Risk factor :
Medium / CVSS Base Score : 5.0