Description
api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5812 | api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. |
Github GHSA |
GHSA-xjmj-p278-4jp5 | OpenStack Compute (Nova) Exposure of Sensitive Information to an Unauthorized Actor vulnerability |
Ubuntu USN |
USN-2325-1 | OpenStack Nova vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:43:06.334Z
Reserved: 2014-05-14T00:00:00.000Z
Link: CVE-2014-3517
No data.
Status : Modified
Published: 2014-08-07T11:13:34.967
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-3517
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN