How to Buy
Ubuntu Security Notice (C) 2014-2016 Canonical, Inc. / NASL script (C) 2014-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Darragh O'Reilly discovered that OpenStack Nova did not properly set
up its sudo configuration. If a different flaw was found in OpenStack
Nova, this vulnerability could be used to escalate privileges. This
issue only affected Ubuntu 13.10 and Ubuntu 14.04 LTS. (CVE-2013-1068)
Bernhard M. Wiedemann and Pedraig Brady discovered that OpenStack Nova
did not properly verify the virtual size of a QCOW2 images. A remote
authenticated attacker could exploit this to create a denial of
service via disk consumption. This issue did not affect Ubuntu 14.04
LTS. (CVE-2013-4463, CVE-2013-4469)
JuanFra Rodriguez Cardoso discovered that OpenStack Nova did not
enforce SSL connections when Nova was configured to use QPid and
qpid_protocol is set to 'ssl'. If a remote attacker were able to
perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information. Ubuntu does not use QPid with Nova by
default. This issue did not affect Ubuntu 14.04 LTS. (CVE-2013-6491)
Loganathan Parthipan discovered that OpenStack Nova did not properly
create expected files during KVM live block migration. A remote
authenticated attacker could exploit this to obtain root disk snapshot
contents via ephemeral storage. This issue did not affect Ubuntu 14.04
Stanislaw Pitucha discovered that OpenStack Nova did not enforce the
image format when rescuing an instance. A remote authenticated
attacker could exploit this to read host files. In the default
installation, attackers would be isolated by the libvirt guest
AppArmor profile. This issue only affected Ubuntu 13.10.
Mark Heckmann discovered that OpenStack Nova did not enforce RBAC
policy when adding security group rules via the EC2 API. A remote
authenticated user could exploit this to gain unintended access to
this API. This issue only affected Ubuntu 13.10. (CVE-2014-0167).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected python-nova package.
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 76109 ()
Bugtraq ID: 63467634686510665276664956675368094
CVE ID: CVE-2013-1068CVE-2013-4463CVE-2013-4469CVE-2013-6491CVE-2013-7130CVE-2014-0134CVE-2014-0167
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.