CVE-2019-9735
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
Published
2019-03-13T02:29:00.277
Last Modified
2024-11-21T04:52:12.073
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 6.5 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
8.0
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://www.openwall.com/lists/oss-security/2019/03/18/2
Mailing List, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/107390
Third Party Advisory, VDB Entry
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:0879
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:0916
Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:0935
Third Party Advisory
([email protected])
-
https://launchpad.net/bugs/1818385
Exploit, Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://seclists.org/bugtraq/2019/Mar/24
Mailing List, Third Party Advisory
([email protected])
-
https://security.openstack.org/ossa/OSSA-2019-001.html
Patch, Vendor Advisory
([email protected])
-
https://usn.ubuntu.com/4036-1/
([email protected])
-
https://www.debian.org/security/2019/dsa-4409
Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2019/03/18/2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/107390
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:0879
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:0916
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:0935
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://launchpad.net/bugs/1818385
Exploit, Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://seclists.org/bugtraq/2019/Mar/24
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.openstack.org/ossa/OSSA-2019-001.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4036-1/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2019/dsa-4409
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)