Bug 1293648 - Ciritical and High Security Vulnerabilites after RHOSP 7 director install
Summary: Ciritical and High Security Vulnerabilites after RHOSP 7 director install
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: Security
Version: 7.0 (Kilo)
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 7.0 (Kilo)
Assignee: Mike Burns
QA Contact: Shai Revivo
URL:
Whiteboard:
Depends On:
Blocks: 1302938 1339488
TreeView+ depends on / blocked
 
Reported: 2015-12-22 14:40 UTC by Jeremy
Modified: 2019-10-10 10:46 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-10-12 19:59:07 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Jeremy 2015-12-22 14:40:42 UTC
This week our Security Team have been doing a Security Audit on the dSN OpenStack environment.

The first results have been quite disturbing:

Critical Risk:
•	IPMI Cipher Suite Zero Authentication Bypass. The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

High Risk: 
-	SNMP community “public” in several hosts.
-	IPMI v2.0 Password Hash Disclosure. The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.
-	VNC Server Unauthenticated Access
-	OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities (Heartbleed and others)
-	Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution The remote host is running a version of Dropbear SSH before 2012.55. As such, it reportedly contains a flaw that might allow an attacker to run arbitrary code on the remote host with root privileges if they are authenticated using a public key and command restriction is enforced.

Medium Risk:
-	Vulnerabilities in SSL and TSL configuration (CRIME, BEAST, Poodle, Freak, Logjam)
-	Weak ciphers (RC4, Export ciphers)
-	TRACE method Enabled.


Note You need to log in before you can comment on or make changes to this bug.