CVE-2014-3632

Loading...

General

Score:7.6/10.0
Severity:High
Category:Access Control Error

Impact Metrics

Confidentiality:Complete
Integrity:Complete
Availability:Complete

Exploitability Metrics

Access Vector:Network
Access Complexity:High
Authentication:None

Published on 07/10/14 - Updated on 22/10/18

Description

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

Category: Access Control Error

CWE-264 (Permissions, Privileges, and Access Control)
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Security Notices

US National Vulnerability DatabaseCVE-2014-3632

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
openstackneutron

Share this vulnerability with:

Twitter Facebook LinkedIn Mail