Versio.io

CVE-2013-0164

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 31-01-2013 01:00
Last modified: - 31-01-2013 01:00
Total changes: - 8

Description

CVE-2013-0164 openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation

Common Vulnerability Scoring System (CVSS)

AV:L/AC:L/Au:N/C:N/I:N/A:P
Low
Attack complexity
Local
Attack vector
Low
Availability
None
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
2.1
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=jenkins-0 AND versionEndExcluding=1.498-1.1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=mongodb-0 AND versionEndExcluding=2.0.2-6.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-console-0 AND versionEndExcluding=0.0.13-2.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-broker-0 AND versionEndExcluding=1.0.10-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-broker-util-0 AND versionEndExcluding=1.0.14-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-cartridge-haproxy-1.4-0 AND versionEndExcluding=1.0.3-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-cartridge-ruby-1.8-0 AND versionEndExcluding=1.0.5-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-cartridge-ruby-1.9-scl-0 AND versionEndExcluding=1.0.5-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-msg-node-mcollective-0 AND versionEndExcluding=1.0.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-node-util-0 AND versionEndExcluding=1.0.7-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=openshift-origin-port-proxy-0 AND versionEndExcluding=1.0.3-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rhc-0 AND versionEndExcluding=1.3.2-1.3.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=ruby193-rubygem-activerecord-1 AND versionEndExcluding=3.2.8-2.el6
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=ruby193-rubygem-passenger-0 AND versionEndExcluding=3.0.12-21.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-activerecord-1 AND versionEndExcluding=3.0.13-3.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-auth-remote-user-0 AND versionEndExcluding=1.0.4-2.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-common-0 AND versionEndExcluding=1.0.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-console-0 AND versionEndExcluding=1.0.6-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-controller-0 AND versionEndExcluding=1.0.11-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-dns-bind-0 AND versionEndExcluding=1.0.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-msg-broker-mcollective-0 AND versionEndExcluding=1.0.4-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=rubygem-openshift-origin-node-0 AND versionEndExcluding=1.0.10-6.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
 

Reference

 


Keywords

REDHAT

 

CVE-2013-0164

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.