SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Red Hat Network Client Tools Vendors:   Red Hat
Red Hat Network Client Tools Lets Local Users Obtain RHN Access Password
SecurityTracker Alert ID:  1024049
SecurityTracker URL:  http://securitytracker.com/id/1024049
CVE Reference:   CVE-2010-1439   (Links to External Site)
Date:  Jun 1 2010
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Red Hat Network Client Tools. A local user can obtain the Red Hat Network access password.

The rhn-client-tools application sets insecure permissions on the 'loginAuth.pkl' file. A local user can access the password stored in that file that is used to authenticate to the Red Hat Network.

A local user can exploit this to download packages from the Red Hat Network and manipulate package or action lists associated with the target system's profile.

Impact:   A local user can obtain the Red Hat Network access password.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2010-0449.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2010-0449.html (Links to External Site)
Cause:   Access control error, Configuration error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Date:  Tue, 1 Jun 2010 12:58:23 -0600
Subject:  [RHSA-2010:0449-01] Moderate: rhn-client-tools security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rhn-client-tools security update
Advisory ID:       RHSA-2010:0449-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0449.html
Issue date:        2010-06-01
CVE Names:         CVE-2010-1439 
=====================================================================

1. Summary:

Updated rhn-client-tools packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - noarch
Red Hat Enterprise Linux Desktop (v. 5 client) - noarch

3. Description:

Red Hat Network Client Tools provide programs and libraries that allow your
system to receive software updates from the Red Hat Network (RHN).

It was discovered that rhn-client-tools set insecure permissions on the
loginAuth.pkl file, used to store session credentials for authenticating
connections to Red Hat Network servers. A local, unprivileged user could
use these credentials to download packages from the Red Hat Network. They
could also manipulate package or action lists associated with the system's
profile. (CVE-2010-1439)

Users of rhn-client-tools are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

585386 - CVE-2010-1439 rhn-client-tools: authorized information disclosure

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/rhn-client-tools-0.4.20-33.el5_5.2.src.rpm

noarch:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/rhn-client-tools-0.4.20-33.el5_5.2.src.rpm

noarch:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-1439.html
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFMBVgnXlSAg2UNWIIRAoW7AKCbO8acpkoOLi5b494hvH8NVXOvVQCgkMns
CgWbdTxtQ7GOjibKcOeeRrQ=
=UnCV
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC