CVE-2013-1838
Nova: DoS by allocating all Fixed IPs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function.
OpenStack Compute (Nova) Grizzly, Folsom (versión 2012.2) y Essex (versión 2012.1) no implementan apropiadamente una cuota para direcciones IP fijas, lo que permite a los usuarios autenticados remotos causar una denegación de servicio (agotamiento de recursos y fallo para crear nuevas instancias) por medio de un gran número de llamadas a la función addFixedIp.
Loganathan Parthipan discovered that Nova did not properly validate VNC tokens after an instance was deleted. An authenticated attacker could exploit this to access other virtual machines under certain circumstances. This issue did not affect Ubuntu 11.10. Vish Ishaya discovered that Nova did not always enforce quotas on fixed IPs. An authenticated attacker could exploit this to cause a denial of service via resource consumption. Nova will now enforce a quota limit of 10 fixed IPs per instance, which is configurable via 'quota_fixed_ips' in /etc/nova/nova.conf. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-03-21 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://osvdb.org/91303 | Vdb Entry | |
http://www.openwall.com/lists/oss-security/2013/03/14/18 | Mailing List |
|
http://www.securityfocus.com/bid/58492 | Vdb Entry | |
https://bugs.launchpad.net/nova/+bug/1125468 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82877 | Vdb Entry | |
https://lists.launchpad.net/openstack/msg21892.html | Mailing List | |
https://review.openstack.org/#/c/24451 | X_refsource_confirm | |
https://review.openstack.org/#/c/24452 | X_refsource_confirm | |
https://review.openstack.org/#/c/24453 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-0709.html | 2017-08-29 | |
http://secunia.com/advisories/52580 | 2017-08-29 | |
http://secunia.com/advisories/52728 | 2017-08-29 | |
http://ubuntu.com/usn/usn-1771-1 | 2017-08-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=919648 | 2013-04-04 | |
https://access.redhat.com/security/cve/CVE-2013-1838 | 2013-04-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Essex Search vendor "Openstack" for product "Essex" | 2012.1 Search vendor "Openstack" for product "Essex" and version "2012.1" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Folsom Search vendor "Openstack" for product "Folsom" | 2012.2 Search vendor "Openstack" for product "Folsom" and version "2012.2" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Grizzly Search vendor "Openstack" for product "Grizzly" | 2012.2 Search vendor "Openstack" for product "Grizzly" and version "2012.2" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10" | - |
Affected
|