Bug 1293648

Summary: Ciritical and High Security Vulnerabilites after RHOSP 7 director install
Product: Red Hat OpenStack Reporter: Jeremy <jmelvin>
Component: SecurityAssignee: Mike Burns <mburns>
Status: CLOSED CURRENTRELEASE QA Contact: Shai Revivo <srevivo>
Severity: high Docs Contact:
Priority: high    
Version: 7.0 (Kilo)CC: apevec, gmollett, kbasil, lhh, mburns, rcernin, srevivo
Target Milestone: ---Keywords: Security, ZStream
Target Release: 7.0 (Kilo)   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-12 19:59:07 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1302938, 1339488    

Description Jeremy 2015-12-22 14:40:42 UTC
This week our Security Team have been doing a Security Audit on the dSN OpenStack environment.

The first results have been quite disturbing:

Critical Risk:
•	IPMI Cipher Suite Zero Authentication Bypass. The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

High Risk: 
-	SNMP community “public” in several hosts.
-	IPMI v2.0 Password Hash Disclosure. The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.
-	VNC Server Unauthenticated Access
-	OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities (Heartbleed and others)
-	Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution The remote host is running a version of Dropbear SSH before 2012.55. As such, it reportedly contains a flaw that might allow an attacker to run arbitrary code on the remote host with root privileges if they are authenticated using a public key and command restriction is enforced.

Medium Risk:
-	Vulnerabilities in SSL and TSL configuration (CRIME, BEAST, Poodle, Freak, Logjam)
-	Weak ciphers (RC4, Export ciphers)
-	TRACE method Enabled.