CVE-2014-3602

Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*

History

13 Feb 2023, 00:40

Type Values Removed Values Added
Summary It was found that OpenShift Enterprise did not restrict access to the /proc/net/tcp file in gears, which allowed local users to view all listening connections and connected sockets. This could result in remote system's IP or port numbers in use to be exposed, which may be useful for further targeted attacks. Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp.
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:1796', 'name': 'https://access.redhat.com/errata/RHSA-2014:1796', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131680', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131680', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-3602', 'name': 'https://access.redhat.com/security/cve/CVE-2014-3602', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:1906', 'name': 'https://access.redhat.com/errata/RHSA-2014:1906', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 15:16

Type Values Removed Values Added
Summary Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp. It was found that OpenShift Enterprise did not restrict access to the /proc/net/tcp file in gears, which allowed local users to view all listening connections and connected sockets. This could result in remote system's IP or port numbers in use to be exposed, which may be useful for further targeted attacks.
References
  • (MISC) https://access.redhat.com/errata/RHSA-2014:1796 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1131680 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-3602 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:1906 -

Information

Published : 2014-11-13 21:32

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3602

Mitre link : CVE-2014-3602

CVE.ORG link : CVE-2014-3602


JSON object : View

Products Affected

redhat

  • openshift
CWE
CWE-264

Permissions, Privileges, and Access Controls