Vulnerability Details : CVE-2014-0592
Barclamp (aka barclamp-network) 1.7 for the Crowbar Framework, as used in SUSE Cloud 3, does not enable netfilter on bridges when creating new instances, which allows remote attackers to bypass security group restrictions via unspecified vectors, related to floating IPs.
Products affected by CVE-2014-0592
- cpe:2.3:a:novell:suse_cloud:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:crowbar:barclamp:1.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0592
0.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-0592
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0592
-
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00025.html
[security-announce] SUSE-SU-2014:0452-1: important: Security update forPatch;Vendor Advisory
-
https://github.com/crowbar/barclamp-network/pull/269
Enable netfilter on bridges by vuntz · Pull Request #269 · crowbar/barclamp-network · GitHub
-
http://www.securityfocus.com/bid/66519
SUSE Cloud Security Group Handling Security Bypass Vulnerability
-
https://bugzilla.novell.com/show_bug.cgi?id=864183
Bug 864183 – VUL-0: CVE-2014-0592: crowbar-barclamp-network: SUSE Cloud 3 doesn't enforce security groups
Jump to