GSD-2019-9735
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-9735",
"description": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)",
"id": "GSD-2019-9735",
"references": [
"https://www.suse.com/security/cve/CVE-2019-9735.html",
"https://www.debian.org/security/2019/dsa-4409",
"https://access.redhat.com/errata/RHSA-2019:0935",
"https://access.redhat.com/errata/RHSA-2019:0916",
"https://access.redhat.com/errata/RHSA-2019:0879",
"https://ubuntu.com/security/CVE-2019-9735"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-9735"
],
"details": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)",
"id": "GSD-2019-9735",
"modified": "2023-12-13T01:23:47.552799Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9735",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "107390",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107390"
},
{
"name": "https://launchpad.net/bugs/1818385",
"refsource": "MISC",
"url": "https://launchpad.net/bugs/1818385"
},
{
"name": "https://security.openstack.org/ossa/OSSA-2019-001.html",
"refsource": "CONFIRM",
"url": "https://security.openstack.org/ossa/OSSA-2019-001.html"
},
{
"name": "[oss-security] 20190318 [OSSA-2019-001] Unsupported dport option prevents applying security groups in OpenStack Neutron (CVE-2019-9735)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/03/18/2"
},
{
"name": "20190319 [SECURITY] [DSA 4409-1] neutron security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Mar/24"
},
{
"name": "DSA-4409",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4409"
},
{
"name": "RHSA-2019:0916",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0916"
},
{
"name": "RHSA-2019:0935",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0935"
},
{
"name": "RHSA-2019:0879",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0879"
},
{
"name": "USN-4036-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4036-1/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c10.0.8||\u003e=11.0.0,\u003c11.0.7||\u003e=12.0.0,\u003c12.0.6||\u003e=13.0.0,\u003c13.0.3",
"affected_versions": "All versions before 10.0.8, all versions starting from 11.0.0 before 11.0.7, all versions starting from 12.0.0 before 12.0.6, all versions starting from 13.0.0 before 13.0.3",
"cvss_v2": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-755",
"CWE-937"
],
"date": "2019-06-25",
"description": "An issue was discovered in the iptables firewall module in OpenStack Neutron. By setting a destination port in a security group rule along with a protocol that does not support that option (for example, VRRP), an authenticated user may block further application of security group rules. Only deployments using the iptables security group driver are affected.",
"fixed_versions": [
"11.0.7",
"12.0.6",
"13.0.3"
],
"identifier": "CVE-2019-9735",
"identifiers": [
"CVE-2019-9735"
],
"not_impacted": "All versions starting from 10.0.8 before 11.0.0, all versions starting from 11.0.7 before 12.0.0, all versions starting from 12.0.6 before 13.0.0, all versions starting from 13.0.3",
"package_slug": "pypi/neutron",
"pubdate": "2019-03-12",
"solution": "Upgrade to versions 11.0.7, 12.0.6, 13.0.3 or above.",
"title": "Insecure Defaults",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-9735",
"http://www.securityfocus.com/bid/107390",
"https://launchpad.net/bugs/1818385",
"https://security.openstack.org/ossa/OSSA-2019-001.html",
"http://www.openwall.com/lists/oss-security/2019/03/18/2",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9735",
"https://cwe.mitre.org/data/definitions/355.html"
],
"uuid": "1a501be1-be2c-4ca8-806d-2d4edae401e7"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "12.0.6",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.0.3",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.0.7",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.0.8",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9735"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn\u0027t support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it\u0027s applied. (Only deployments using the iptables security group driver are affected.)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1818385",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1818385"
},
{
"name": "107390",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107390"
},
{
"name": "DSA-4409",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4409"
},
{
"name": "https://security.openstack.org/ossa/OSSA-2019-001.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory",
"Patch"
],
"url": "https://security.openstack.org/ossa/OSSA-2019-001.html"
},
{
"name": "20190319 [SECURITY] [DSA 4409-1] neutron security update",
"refsource": "BUGTRAQ",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Mar/24"
},
{
"name": "[oss-security] 20190318 [OSSA-2019-001] Unsupported dport option prevents applying security groups in OpenStack Neutron (CVE-2019-9735)",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/03/18/2"
},
{
"name": "RHSA-2019:0935",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0935"
},
{
"name": "RHSA-2019:0916",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0916"
},
{
"name": "RHSA-2019:0879",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0879"
},
{
"name": "USN-4036-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4036-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-08-04T17:15Z",
"publishedDate": "2019-03-13T02:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…