Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1428240 - (CVE-2017-2637) CVE-2017-2637 rhosp-director:libvirtd is deployed with no authentication
CVE-2017-2637 rhosp-director:libvirtd is deployed with no authentication
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20170517,repo...
: Security, Triaged
Depends On: 1428241 1428590 1428591 1428592 1428593
Blocks: 1425413
  Show dependency treegraph
 
Reported: 2017-03-02 01:18 EST by Summer Long
Modified: 2017-06-20 20:07 EDT (History)
36 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A design flaw issue was found in the Red Hat OpenStack Platform director use of TripleO to enable libvirtd based live-migration. Libvirtd is deployed by default (by director) listening on 0.0.0.0 (all interfaces) with no-authentication or encryption. Anyone able to make a TCP connection to any compute host IP address, including 127.0.0.1, other loopback interface addresses, or in some cases possibly addresses that have been exposed beyond the management interface, could use this to open a virsh session to the libvirtd instance and gain control of virtual machine instances or possibly take over the host.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-06-20 20:07:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 3022771 None None None 2017-05-17 16:42 EDT
Red Hat Product Errata RHSA-2017:1242 normal SHIPPED_LIVE Important: Red Hat OpenStack Platform director security update 2017-05-17 12:19:05 EDT
Red Hat Product Errata RHSA-2017:1504 normal SHIPPED_LIVE Important: Red Hat OpenStack Platform director security update 2017-06-19 14:45:36 EDT
Red Hat Product Errata RHSA-2017:1537 normal SHIPPED_LIVE Important: Red Hat OpenStack Platform director security update 2017-06-20 12:23:41 EDT
Red Hat Product Errata RHSA-2017:1546 normal SHIPPED_LIVE Important: Red Hat OpenStack Platform director security update 2017-06-20 12:44:42 EDT

  None (edit)
Description Summer Long 2017-03-02 01:18:56 EST
OSP director was found to deploy libvirtd listening on 0.0.0.0 with no-authentication and in some cases no network ACL's. Anyone able to make a tcp connection to any compute host IP address, including 127.0.0.1, other loopback interface addresses or in some cases even those exposed beyond the management interface, could use this to open a virsh session to the libvirtd instance and gain control of virtual machine instances or possibly take over the host.

External References:

https://access.redhat.com/solutions/3022771
https://wiki.openstack.org/wiki/OSSN/OSSN-0007
Comment 3 Daniel Berrange 2017-03-07 07:11:46 EST
(In reply to Summer Long from comment #0)
> OSP director was found to deploy libvirtd listening on 0.0.0.0 with
> no-authentication and in some cases no network ACL's. Anyone able to make a
> tcp connection to any compute host IP address, including those exposed
> beyond the management interface, could use this to open a virsh session to
> the libvirtd instance and gain control of virtual machine instances or
> possibly take over the host.

It is not merely remote attackers that are a problem. Local unprivileged processes can connect to 127.0.0.1, avoiding any firewalls, and use this to elevate their privileges to root. ie local privilege escalation even if a firewall is present.
Comment 4 Garth Mollett 2017-03-07 17:57:02 EST
(In reply to Daniel Berrange from comment #3)
> (In reply to Summer Long from comment #0)
> > OSP director was found to deploy libvirtd listening on 0.0.0.0 with
> > no-authentication and in some cases no network ACL's. Anyone able to make a
> > tcp connection to any compute host IP address, including those exposed
> > beyond the management interface, could use this to open a virsh session to
> > the libvirtd instance and gain control of virtual machine instances or
> > possibly take over the host.
> 
> It is not merely remote attackers that are a problem. Local unprivileged
> processes can connect to 127.0.0.1, avoiding any firewalls, and use this to
> elevate their privileges to root. ie local privilege escalation even if a
> firewall is present.

Thanks Dan. I modified the text to add "(including 127.0.0.1 or other loopback interface addresses)". I think that should make the local escalation path clear.
Comment 5 Ollie Walsh 2017-03-09 10:29:51 EST
Dan raise this issue for the upstream docs long ago https://bugs.launchpad.net/openstack-manuals/+bug/1287194

Which resulted in https://wiki.openstack.org/wiki/OSSN/OSSN-0007
Comment 13 Summer Long 2017-03-29 19:00:18 EDT
Acknowledgments:

Name: David Gurtner (Red Hat)
Comment 30 errata-xmlrpc 2017-05-17 08:23:24 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2017:1242 https://access.redhat.com/errata/RHSA-2017:1242
Comment 31 Garth Mollett 2017-05-17 16:35:31 EDT
Mitigation:

A KCS article with more details on this flaw is available at: https://access.redhat.com/solutions/3022771
Comment 32 errata-xmlrpc 2017-06-19 10:46:52 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 9.0 (Mitaka) director

Via RHSA-2017:1504 https://access.redhat.com/errata/RHSA-2017:1504
Comment 33 errata-xmlrpc 2017-06-20 08:25:53 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform director 7.0 for RHEL 7

Via RHSA-2017:1537 https://access.redhat.com/errata/RHSA-2017:1537
Comment 34 errata-xmlrpc 2017-06-20 08:46:02 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8.0 (Liberty) director

Via RHSA-2017:1546 https://access.redhat.com/errata/RHSA-2017:1546
Comment 35 Stephen Gordon 2017-06-20 15:18:15 EDT
(In reply to Garth Mollett from comment #31)
> Mitigation:
> 
> A KCS article with more details on this flaw is available at:
> https://access.redhat.com/solutions/3022771

I've updated the article to reflect that the relevant erratum have been released for Red Hat OpenStack Platform 7, 8, 9.

Note You need to log in before you can comment on or make changes to this bug.