A flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token. | A flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system. |
| Title | Keystone: Large HTTP request DoS | Keystone: openstack keystone: denial of service via large http request with long tenant name |
| Weaknesses | CWE-1284 | |
| CPEs | cpe:/a:redhat:openstack:13 cpe:/a:redhat:openstack:16.2 cpe:/a:redhat:openstack:17.1 cpe:/a:redhat:openstack:18.0 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2013-04-12T22:00:00.000Z
Updated: 2026-04-07T06:55:17.958Z
Reserved: 2012-12-06T00:00:00.000Z
Link: CVE-2013-0270
No data.
Status : Deferred
Published: 2013-04-12T22:55:01.070
Modified: 2026-04-07T07:16:23.067
Link: CVE-2013-0270