blob: a79a46ff794f8ab0387d016ac3017151b56bb6dd [file] [log] [blame]
---
layout: post
status: PUBLISHED
published: true
title: "[CVE-2013-6398] CloudStack Virtual Router stop/start modifies firewall rules
allowing additional access"
id: f25f4ea0-d887-48aa-b808-66e24460aeef
date: '2014-01-10 14:00:00 -0500'
categories: cloudstack
tags:
- security
permalink: cloudstack/entry/cve_2013_6398_cloudstack_virtual
---
<p>
Product: Apache CloudStack<br/><br />
Vendor: Apache Software Foundation<br/><br />
Vulnerability type: Bypass<br/><br />
Vulnerable Versions: Apache CloudStack 4.1.0, 4.1.1, 4.2.0<br/><br />
CVE References: CVE-2013-2136<br/><br />
Risk Level: Low<br/><br />
CVSSv2 Base Scores: 2.8 (AV:N/AC:M/Au:M/C:P/I:N/A:N)<br/></p>
<p>Description:</p>
<p>The Apache CloudStack Security Team was notified of a an issue in the Apache CloudStack virtual router that failed to preserve source restrictions in firewall rules after a virtual router had been stopped and restarted.</p>
<p>Mitigation:</p>
<p>Upgrading to CloudStack 4.2.1 or higher will mitigate this issue.</p>
<p>References:</p>
<p>https://issues.apache.org/jira/browse/CLOUDSTACK-5263</p>
<p>Credit:</p>
<p>This issue was identified by the Cloud team at Schuberg Philis</p>