HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
References
Link | Resource |
---|---|
https://www.eucalyptus.com/resources/security/advisories/esa-32 | Vendor Advisory |
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04926463 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-01-04 18:59
Updated : 2016-01-05 11:42
NVD link : CVE-2014-5040
Mitre link : CVE-2014-5040
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
eucalyptus
- eucalyptus