mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2014-0592",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Barclamp (aka barclamp-network) 1.7 for the Crowbar Framework, as used in SUSE Cloud 3, does not enable netfilter on bridges when creating new instances, which allows remote attackers to bypass security group restrictions via unspecified vectors, related to floating IPs."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "66519",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/66519"
|
|
},
|
|
{
|
|
"name": "https://github.com/crowbar/barclamp-network/pull/269",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/crowbar/barclamp-network/pull/269"
|
|
},
|
|
{
|
|
"name": "57509",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/57509"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.novell.com/show_bug.cgi?id=864183",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=864183"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2014:0452",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00025.html"
|
|
}
|
|
]
|
|
}
|
|
} |