Insecure Configuration In Some EuStore EMIs
An insecure configuration has been identified in some EMIs provided by Eucalyptus EuStore. The root password was left empty in certain situations potentially allowing for privilege escalation by system users. Updated images are now available. We recommend immediately replacing them with the newest version.
As a part of Eucalyptus's EuStore image hardening effort, an insecure configuration, where the root password was left empty, has been identified in four EuStore EMIs. This problem is partly related to CVE-2013-2069, where a third-party tool used to generated EMIs was leaving the root password unset instead of locking it. An unset root password can allow for privilege escalation by users on any Eucalyptus instance instantiated from the affected EMI. None of the reported EMIs allowed remote root ssh using the empty password.
Set or lock the root account password on any instance running from the affected EMI. To set the password, execute:
To lock the password, execute:
Updated EMIs 1222062543 (Centos 6.3), 2518794716 (Fedora 16), 0278205488 (Fedora 17), 1424900416 (OpenSUSE 12.2) resolve this issue.
Contact and help
Contact the Eucalyptus security team at email@example.com.