Ubuntu 12.04 LTS / 12.10 / 13.04 : nova vulnerabilities (USN-2000-1)

Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that Nova did not properly enforce the is_public
property when determining flavor access. An authenticated attacker
could exploit this to obtain sensitive information in private flavors.
This issue only affected Ubuntu 12.10 and 13.10. (CVE-2013-2256,
CVE-2013-4278)

Grant Murphy discovered that Nova would allow XML entity processing. A
remote unauthenticated attacker could exploit this using the Nova API
to cause a denial of service via resource exhaustion. This issue only
affected Ubuntu 13.10. (CVE-2013-4179)

Vishvananda Ishaya discovered that Nova inefficiently handled network
security group updates when Nova was configured to use nova-network.
An authenticated attacker could exploit this to cause a denial of
service. (CVE-2013-4185)

Jaroslav Henner discovered that Nova did not properly handle certain
inputs to the instance console when Nova was configured to use Apache
Qpid. An authenticated attacker could exploit this to cause a denial
of service on the compute node running the instance. By default,
Ubuntu uses RabbitMQ instead of Qpid. (CVE-2013-4261).

Solution :

Update the affected python-nova package.

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.2
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 70579 ()

Bugtraq ID: 61637
61639
61692
62016
62200

CVE ID: CVE-2013-2256
CVE-2013-4179
CVE-2013-4185
CVE-2013-4261
CVE-2013-4278