CVE-2013-0270
12.04.2013, 22:55
A flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| openstack | keystone | 2012.1 ≤ 𝑥 ≤ 2012.1.3 |
| openstack | keystone | 2012.2 ≤ 𝑥 ≤ 2012.2.4 |
| openstack | keystone | 2013.1:milestone1 |
| openstack | keystone | 2013.1:milestone2 |
| openstack | keystone | 2013.1:milestone3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
- CWE-1284 - Improper Validation of Specified Quantity in InputThe product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
References