Eucalyptus Systems Eucalyptus 2.0

CPE Details

Eucalyptus Systems Eucalyptus 2.0
2.0
2012-10-02
18h09 +00:00
2012-10-05
16h27 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:eucalyptus:eucalyptus:2.0:*:*:*:*:*:*:*

Informations

Vendor

eucalyptus

Product

eucalyptus

Version

2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-8520 2018-02-15 22h00 +00:00 HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. In some cases, authenticated users with S3 permissions could also access versioned data.
8.8
High
CVE-2013-4768 2014-04-15 20h00 +00:00 The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).
5
CVE-2013-4767 2013-10-10 00h00 +00:00 Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors.
10
CVE-2012-4067 2013-09-17 01h00 +00:00 Walrus in Eucalyptus before 3.2.2 allows remote attackers to cause a denial of service (memory, thread, and CPU consumption) via a crafted XML message containing a DTD, as demonstrated by a bucket-logging request.
4.3
CVE-2013-2296 2013-09-17 01h00 +00:00 Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request.
5.5
CVE-2013-4766 2013-09-17 01h00 +00:00 The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
4.3
CVE-2012-4066 2013-03-08 18h00 +00:00 The internal message protocol for Walrus in Eucalyptus 3.2.0 and earlier does not require signatures for unspecified request headers, which allows attackers to (1) delete or (2) upload snapshots.
5
CVE-2012-4064 2012-10-01 23h00 +00:00 Eucalyptus before 3.1.1 does not properly restrict the binding of external SOAP web-services messages, which allows remote authenticated users to gain privileges by sending a message to (1) Cloud Controller or (2) Walrus with the internal message format and a modified user id.
6.5
CVE-2012-4065 2012-10-01 23h00 +00:00 Eucalyptus before 3.1.1 does not properly restrict the binding of external SOAP web-services messages, which allows remote authenticated users to bypass unspecified authorization checks and obtain direct access to a (1) Cloud Controller or (2) Walrus service via a crafted message, as demonstrated by changes to a volume, snapshot, or cloud configuration setting.
3.5
CVE-2012-4063 2012-10-01 21h00 +00:00 The Apache Santuario configuration in Eucalyptus before 3.1.1 does not properly restrict applying XML Signature transforms to documents, which allows remote attackers to cause a denial of service via unspecified vectors.
5
CVE-2011-0730 2011-06-02 17h00 +00:00 Eucalyptus before 2.0.3 and Eucalyptus EE before 2.0.2, as used in Ubuntu Enterprise Cloud (UEC) and other products, do not properly interpret signed elements in SOAP requests, which allows man-in-the-middle attackers to execute arbitrary commands by modifying a request, related to an "XML Signature Element Wrapping" or a "SOAP signature replay" issue.
6.5