Vulnerabilities > Eucalyptus > Eucalyptus

DATE CVE VULNERABILITY TITLE RISK
2018-02-15 CVE-2016-8528 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found.
network
low complexity
eucalyptus CWE-264
6.5
2018-02-15 CVE-2016-8520 Permission Issues vulnerability in Eucalyptus
HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs.
network
low complexity
eucalyptus CWE-275
6.5
2017-06-01 CVE-2017-7999 Denial-Of-Service vulnerability in Eucalyptus
Atlassian Eucalyptus before 4.4.1, when in EDGE mode, allows remote authenticated users with certain privileges to cause a denial of service (E2 service outage) via unspecified vectors.
network
eucalyptus
3.5
2016-01-05 CVE-2015-6861 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
network
high complexity
eucalyptus CWE-264
4.6
2016-01-05 CVE-2014-5040 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus 4.1.1/4.2.0
HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
network
high complexity
eucalyptus CWE-264
4.6
2014-12-26 CVE-2013-4769 Data Processing Errors vulnerability in Eucalyptus
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries.
network
eucalyptus CWE-19
4.3
2014-11-07 CVE-2014-5038 Information Exposure vulnerability in Eucalyptus
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
local
low complexity
eucalyptus CWE-200
2.1
2014-11-07 CVE-2014-5037 Information Exposure vulnerability in Eucalyptus 4.0.0/4.0.1
Eucalyptus 4.0.0 through 4.0.1, when the log level is set to INFO, logs user and system passwords, which allows local users to obtain sensitive information by reading cloud-requests.log.
local
low complexity
eucalyptus CWE-200
2.1
2014-09-05 CVE-2014-5036 Information Exposure vulnerability in Eucalyptus 3.4.2/3.4.3/4.0.0
The Storage Controller (SC) component in Eucalyptus 3.4.2 through 4.0.x before 4.0.1, when Dell Equallogic SAN is used, logs the CHAP user credentials, which allows local users to obtain sensitive information by reading the logs.
1.9
2014-04-16 CVE-2013-4768 Improper Input Validation vulnerability in Eucalyptus
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).
network
low complexity
eucalyptus CWE-20
5.0