GSD-2015-3221
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2015-3221",
"description": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.",
"id": "GSD-2015-3221",
"references": [
"https://www.suse.com/security/cve/CVE-2015-3221.html",
"https://access.redhat.com/errata/RHSA-2015:1680"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-3221"
],
"details": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.",
"id": "GSD-2015-3221",
"modified": "2023-12-13T01:20:07.792567Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3221",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html",
"refsource": "MISC",
"url": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2015-1680.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1680.html"
},
{
"name": "http://www.securityfocus.com/bid/75368",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/75368"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1461054",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/neutron/+bug/1461054"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c2014.2.4||\u003e=2015.1.0,\u003c2015.1.1",
"affected_versions": "All versions before 2014.2.4, all versions starting from 2015.1.0 before 2015.1.1",
"cvss_v2": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2023-02-08",
"description": "A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash.",
"fixed_versions": [
"2014.2.4",
"2015.1.1"
],
"identifier": "CVE-2015-3221",
"identifiers": [
"GHSA-wf44-4mgj-rwvx",
"CVE-2015-3221"
],
"not_impacted": "All versions starting from 2014.2.4 before 2015.1.0, all versions starting from 2015.1.1",
"package_slug": "pypi/neutron",
"pubdate": "2022-05-14",
"solution": "Upgrade to versions 2014.2.4, 2015.1.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2015-3221",
"https://bugs.launchpad.net/neutron/+bug/1461054",
"http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html",
"http://rhn.redhat.com/errata/RHSA-2015-1680.html",
"https://access.redhat.com/errata/RHSA-2015:1680",
"https://access.redhat.com/security/cve/CVE-2015-3221",
"https://bugzilla.redhat.com/show_bug.cgi?id=1232284",
"https://git.openstack.org/cgit/openstack/neutron/commit/?id=9ff6138c47c95034ba845e9448ddffd147b51f38",
"https://web.archive.org/web/20200228084753/http://www.securityfocus.com/bid/75368",
"https://github.com/advisories/GHSA-wf44-4mgj-rwvx"
],
"uuid": "77a57405-264d-455f-9a2f-c17afca0e978"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2014.2.4",
"versionStartIncluding": "2014.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2015.1.1",
"versionStartIncluding": "2015.1.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3221"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[openstack-announce] 20150623 [OSSA 2015-012] Neutron L2 agent DoS through incorrect allowed address pairs (CVE-2015-3221)",
"refsource": "MLIST",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.openstack.org/pipermail/openstack-announce/2015-June/000377.html"
},
{
"name": "RHSA-2015:1680",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1680.html"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1461054",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1461054"
},
{
"name": "75368",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/75368"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:48Z",
"publishedDate": "2015-08-26T19:59Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…