gsd-2015-3221
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2015-3221",
    "description": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.",
    "id": "GSD-2015-3221",
    "references": [
      "https://www.suse.com/security/cve/CVE-2015-3221.html",
      "https://access.redhat.com/errata/RHSA-2015:1680"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2015-3221"
      ],
      "details": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.",
      "id": "GSD-2015-3221",
      "modified": "2023-12-13T01:20:07.792567Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2015-3221",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html",
            "refsource": "MISC",
            "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html"
          },
          {
            "name": "http://rhn.redhat.com/errata/RHSA-2015-1680.html",
            "refsource": "MISC",
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1680.html"
          },
          {
            "name": "http://www.securityfocus.com/bid/75368",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/bid/75368"
          },
          {
            "name": "https://bugs.launchpad.net/neutron/+bug/1461054",
            "refsource": "MISC",
            "url": "https://bugs.launchpad.net/neutron/+bug/1461054"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c2014.2.4||\u003e=2015.1.0,\u003c2015.1.1",
          "affected_versions": "All versions before 2014.2.4, all versions starting from 2015.1.0 before 2015.1.1",
          "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "cwe_ids": [
            "CWE-1035",
            "CWE-20",
            "CWE-937"
          ],
          "date": "2023-02-08",
          "description": "A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash.",
          "fixed_versions": [
            "2014.2.4",
            "2015.1.1"
          ],
          "identifier": "CVE-2015-3221",
          "identifiers": [
            "GHSA-wf44-4mgj-rwvx",
            "CVE-2015-3221"
          ],
          "not_impacted": "All versions starting from 2014.2.4 before 2015.1.0, all versions starting from 2015.1.1",
          "package_slug": "pypi/neutron",
          "pubdate": "2022-05-14",
          "solution": "Upgrade to versions 2014.2.4, 2015.1.1 or above.",
          "title": "Improper Input Validation",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2015-3221",
            "https://bugs.launchpad.net/neutron/+bug/1461054",
            "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html",
            "http://rhn.redhat.com/errata/RHSA-2015-1680.html",
            "https://access.redhat.com/errata/RHSA-2015:1680",
            "https://access.redhat.com/security/cve/CVE-2015-3221",
            "https://bugzilla.redhat.com/show_bug.cgi?id=1232284",
            "https://git.openstack.org/cgit/openstack/neutron/commit/?id=9ff6138c47c95034ba845e9448ddffd147b51f38",
            "https://web.archive.org/web/20200228084753/http://www.securityfocus.com/bid/75368",
            "https://github.com/advisories/GHSA-wf44-4mgj-rwvx"
          ],
          "uuid": "77a57405-264d-455f-9a2f-c17afca0e978"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2014.2.4",
                "versionStartIncluding": "2014.2",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2015.1.1",
                "versionStartIncluding": "2015.1.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-3221"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[openstack-announce] 20150623 [OSSA 2015-012] Neutron L2 agent DoS through incorrect allowed address pairs (CVE-2015-3221)",
              "refsource": "MLIST",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html"
            },
            {
              "name": "RHSA-2015:1680",
              "refsource": "REDHAT",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1680.html"
            },
            {
              "name": "https://bugs.launchpad.net/neutron/+bug/1461054",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://bugs.launchpad.net/neutron/+bug/1461054"
            },
            {
              "name": "75368",
              "refsource": "BID",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/bid/75368"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 8.0,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2023-02-13T00:48Z",
      "publishedDate": "2015-08-26T19:59Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.