This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours

Bug 906171 (CVE-2013-0247)

Summary: CVE-2013-0247 OpenStack Keystone: denial of service through invalid token requests
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact: Pavel Sedlák <psedlak>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apevec, ayoung, cpelland, dprince, markmc, rbryant, security-response-team, ykaul
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20130205,reported=20130130,source=upstream,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P,openstack-1/openstack-keystone=wontfix,openstack-2.1/openstack-keystone=affected,fedora-all/openstack-keystone=affected,epel-6/openstack-keystone=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-23 10:19:34 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Bug Depends On: 906173, 906174, 906178    
Bug Blocks: 889355, 906189    
Attachments:
Description Flags
essex-CVE-2013-0247.patch
none
folsom-CVE-2013-0247.patch
none
grizzly-CVE-2013-0247.patch none

Description Kurt Seifried 2013-01-30 23:31:44 EST
Thierry Carrez (thierry@openstack.org) of the OpenStack Project reports:

Title: Keystone denial of service through invalid token requests
Reporter: Dan Prince (Red Hat)
Products: Keystone
Affects: All versions

Description:
Dan Prince of Red Hat reported a vulnerability in token creation error
handling in Keystone. By requesting lots of invalid tokens, an
unauthenticated user may fill up logs on Keystone API servers disks,
potentially resulting in a denial of service attack against Keystone.

Proposed patches:
See attached patches for current development tree (Grizzly) and the
Folsom and Essex series. Unless a flaw is discovered in them, these
proposed patches will be merged to Keystone master, stable/folsom and
stable/essex branches on the public disclosure date.
Comment 1 Kurt Seifried 2013-01-30 23:33:00 EST
Created attachment 690725 [details]
essex-CVE-2013-0247.patch
Comment 2 Kurt Seifried 2013-01-30 23:33:26 EST
Created attachment 690726 [details]
folsom-CVE-2013-0247.patch
Comment 3 Kurt Seifried 2013-01-30 23:33:42 EST
Created attachment 690727 [details]
grizzly-CVE-2013-0247.patch
Comment 9 Kurt Seifried 2013-01-31 15:17:43 EST
*** Bug 889353 has been marked as a duplicate of this bug. ***
Comment 10 Murray McAllister 2013-02-03 21:12:41 EST
Acknowledgements:

This issue was discovered by Dan Prince of Red Hat.
Comment 11 errata-xmlrpc 2013-02-12 12:50:55 EST
This issue has been addressed in following products:

  OpenStack Folsom for RHEL 6

Via RHSA-2013:0253 https://rhn.redhat.com/errata/RHSA-2013-0253.html
Comment 12 Fedora Update System 2013-02-18 02:03:48 EST
openstack-keystone-2012.2.3-2.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 13 Fedora Update System 2013-03-28 14:38:39 EDT
openstack-keystone-2012.2.3-4.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.