CVE-2014-3608
openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The VMWare driver in OpenStack Compute (Nova) before 2014.1.3 allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by putting the VM into the rescue state, suspending it, which puts into an ERROR state, and then deleting the image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2573.
El controlador VMWare en OpenStack Compute (Nova) anterior a 2014.1.3 permite a usuarios remotos autenticados evadir la límite de la cuota y causar una denegación de servicio (consumo de recursos) mediante la colocación del VM en el estado de rescate, su suspensión, lo que entra en un estado de ERROR, y posteriormente la eliminación de la imagen. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-2573.
OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances, managing networks, and controlling access through users and projects. A race condition flaw was found in the way the nova VMware driver handled VNC port allocation. An authenticated user could use this flaw to gain unauthorized console access to instances belonging to other tenants by repeatedly spawning new instances. Note that only nova setups using the VMware driver and the VNC proxy service were affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-14 CVE Reserved
- 2014-10-06 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-06-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://seclists.org/oss-sec/2014/q4/65 | Mailing List |
|
http://www.securityfocus.com/bid/70220 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugs.launchpad.net/nova/+bug/1338830 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-1781.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2014-1782.html | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2014-3608 | 2014-11-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1148253 | 2014-11-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Nova Search vendor "Openstack" for product "Nova" | >= 2013.2 <= 2013.2.4 Search vendor "Openstack" for product "Nova" and version " >= 2013.2 <= 2013.2.4" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Nova Search vendor "Openstack" for product "Nova" | >= 2014.1 < 2014.1.3 Search vendor "Openstack" for product "Nova" and version " >= 2014.1 < 2014.1.3" | - |
Affected
|