CVE Vulnerabilities

CVE-2019-9735

Improper Handling of Exceptional Conditions

Published: Mar 13, 2019 | Modified: Aug 04, 2021
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.1 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Ubuntu
MEDIUM

An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesnt support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which its applied. (Only deployments using the iptables security group driver are affected.)

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Neutron Openstack * 10.0.8 (excluding)
Neutron Openstack 11.0.0 (including) 11.0.7 (excluding)
Neutron Openstack 12.0.0 (including) 12.0.6 (excluding)
Neutron Openstack 13.0.0 (including) 13.0.3 (excluding)
Neutron Ubuntu bionic *
Neutron Ubuntu cosmic *
Neutron Ubuntu trusty *
Neutron Ubuntu upstream *
Neutron Ubuntu xenial *
Red Hat OpenStack Platform 10.0 (Newton) RedHat openstack-neutron-1:9.4.1-40.el7ost *
Red Hat OpenStack Platform 10.0 (Newton) RedHat openstack-neutron-lbaas-1:9.2.2-8.el7ost *
Red Hat OpenStack Platform 10.0 (Newton) RedHat python-networking-bigswitch-2:9.42.14-1.el7ost *
Red Hat OpenStack Platform 13.0 (Queens) RedHat openstack-neutron-1:12.0.5-11.el7ost *
Red Hat OpenStack Platform 14.0 (Rocky) RedHat openstack-neutron-1:13.0.3-0.20190313155649.00b63be.el7ost *

References