CVE-2013-0270

A flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2013.1:milestone1:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2013.1:milestone2:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2013.1:milestone3:*:*:*:*:*:*

History

07 Apr 2026, 07:16

Type Values Removed Values Added
CWE CWE-1284
References
  • () https://access.redhat.com/security/cve/CVE-2013-0270 -
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 6.5
Summary (en) OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token. (en) A flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system.

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2013-0708.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0708.html - Third Party Advisory
References () https://bugs.launchpad.net/keystone/+bug/1099025 - Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1099025 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=909012 - Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=909012 - Third Party Advisory
References () https://github.com/openstack/keystone/commit/7691276b869a86c2b75631d5bede9f61e030d9d8 - Third Party Advisory () https://github.com/openstack/keystone/commit/7691276b869a86c2b75631d5bede9f61e030d9d8 - Third Party Advisory
References () https://github.com/openstack/keystone/commit/82c87e5638ebaf9f166a9b07a0155291276d6fdc - Third Party Advisory () https://github.com/openstack/keystone/commit/82c87e5638ebaf9f166a9b07a0155291276d6fdc - Third Party Advisory
References () https://launchpad.net/keystone/grizzly/2013.1 - Patch, Third Party Advisory () https://launchpad.net/keystone/grizzly/2013.1 - Patch, Third Party Advisory

Information

Published : 2013-04-12 22:55

Updated : 2026-04-29 01:13


NVD link : CVE-2013-0270

Mitre link : CVE-2013-0270

CVE.ORG link : CVE-2013-0270


JSON object : View

Products Affected

openstack

  • keystone
CWE
CWE-1284

Improper Validation of Specified Quantity in Input

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer