Vulnerabilities > Eucalyptus

DATE CVE VULNERABILITY TITLE RISK
2014-09-05 CVE-2014-5036 Information Exposure vulnerability in Eucalyptus 3.4.2/3.4.3/4.0.0
The Storage Controller (SC) component in Eucalyptus 3.4.2 through 4.0.x before 4.0.1, when Dell Equallogic SAN is used, logs the CHAP user credentials, which allows local users to obtain sensitive information by reading the logs.
1.9
2014-04-16 CVE-2013-4768 Improper Input Validation vulnerability in Eucalyptus
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).
network
low complexity
eucalyptus CWE-20
5.0
2013-10-10 CVE-2013-4767 Remote Command Injection vulnerability in Eucalyptus
Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors.
network
low complexity
eucalyptus
critical
10.0
2013-09-17 CVE-2013-4766 Information Exposure vulnerability in Eucalyptus
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
4.3
2013-09-17 CVE-2013-2297 Credentials Management vulnerability in Eucalyptus Eustore
Eucalyptus EuStore sets a blank root password in the default configuration of EMI 3868652036, EMI 0400376721, EMI 2425352071, and EMI 1347115203, which allows local users to gain privileges via unspecified vectors, a related issue to CVE-2013-2069.
6.9
2013-09-17 CVE-2013-2296 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request.
network
low complexity
eucalyptus CWE-264
5.5
2013-09-17 CVE-2012-4067 Resource Management Errors vulnerability in Eucalyptus
Walrus in Eucalyptus before 3.2.2 allows remote attackers to cause a denial of service (memory, thread, and CPU consumption) via a crafted XML message containing a DTD, as demonstrated by a bucket-logging request.
4.3
2013-03-08 CVE-2012-4066 Improper Authentication vulnerability in Eucalyptus
The internal message protocol for Walrus in Eucalyptus 3.2.0 and earlier does not require signatures for unspecified request headers, which allows attackers to (1) delete or (2) upload snapshots.
network
low complexity
eucalyptus CWE-287
5.0
2012-10-01 CVE-2012-4065 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
Eucalyptus before 3.1.1 does not properly restrict the binding of external SOAP web-services messages, which allows remote authenticated users to bypass unspecified authorization checks and obtain direct access to a (1) Cloud Controller or (2) Walrus service via a crafted message, as demonstrated by changes to a volume, snapshot, or cloud configuration setting.
3.5
2012-10-01 CVE-2012-4064 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
Eucalyptus before 3.1.1 does not properly restrict the binding of external SOAP web-services messages, which allows remote authenticated users to gain privileges by sending a message to (1) Cloud Controller or (2) Walrus with the internal message format and a modified user id.
network
low complexity
eucalyptus CWE-264
6.5