Oracle Solaris Third-Party Patch Update : keystone (cve_2014_7144_cryptographic_issues)

medium Nessus Plugin ID 80660

Synopsis

The remote Solaris system is missing a security patch for third-party software.

Description

The remote Solaris system is missing necessary patches to address security updates :

- OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the 'insecure' option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. (CVE-2014-7144)

Solution

Upgrade to Solaris 11.2.4.6.0.

See Also

http://www.nessus.org/u?4a913f44

http://www.nessus.org/u?22ee091e

Plugin Details

Severity: Medium

ID: 80660

File Name: solaris11_keystone_20141120.nasl

Version: 1.3

Type: local

Published: 1/19/2015

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:oracle:solaris:11.2, p-cpe:/a:oracle:solaris:keystone

Required KB Items: Host/local_checks_enabled, Host/Solaris11/release, Host/Solaris11/pkg-list

Patch Publication Date: 11/20/2014

Reference Information

CVE: CVE-2014-7144