SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Red Hat Network Satellite Server Vendors:   Red Hat
Red Hat Network Satellite Server Bugs Let Remote Users Obtain Files and Other Information
SecurityTracker Alert ID:  1025316
SecurityTracker URL:  http://securitytracker.com/id/1025316
CVE Reference:   CVE-2009-0788, CVE-2010-1171   (Links to External Site)
Date:  Apr 12 2011
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.3, 5.4
Description:   Two vulnerabilities were reported in Red Hat Network Satellite Server. A remote authenticated user can access files on the target system. A remote user can obtain potentially sensitive information.

A remote user can send a specially-crafted HTTP request to the target server to obtain potentially sensitive information about the target host system or to cause the target server to connect to an arbitrary service at an arbitrary IP address [CVE-2009-0788].

A remote authenticated user can access an obsolete XML-RPC API to gain access to arbitrary files accessible to the target RHN Satellite server process [CVE-2010-1171].

Impact:   A remote authenticated user can access files on the target system.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-0434.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2011-0434.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4, 5

Message History:   None.


 Source Message Contents

Subject:  [RHSA-2011:0434-01] Moderate: security update for Red Hat Network Satellite

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: security update for Red Hat Network Satellite
Advisory ID:       RHSA-2011:0434-01
Product:           Red Hat Network Satellite Server
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-0434.html
Issue date:        2011-04-11
CVE Names:         CVE-2009-0788 CVE-2010-1171 
=====================================================================

1. Summary:

Updated packages that fix two security issues are now available for Red Hat
Network Satellite 5.3 and 5.4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Network Satellite Server 5.3 (RHEL v.4) - noarch
Red Hat Network Satellite Server 5.3 (RHEL v.5) - noarch
Red Hat Network Satellite Server 5.4 (RHEL v.5) - noarch

3. Description:

Red Hat Network Satellite (RHN Satellite) is a system management tool for
Linux-based infrastructures. It allows for the provisioning, remote
management and monitoring of multiple Linux deployments with a single,
centralized tool.

RHN Satellite incorrectly exposed an obsolete XML-RPC API for configuring
package group (comps.xml) files for channels. An authenticated user could
use this flaw to gain access to arbitrary files accessible to the RHN
Satellite server process, and prevent clients from performing certain yum
operations. (CVE-2010-1171)

A flaw was found in the way RHN Satellite rewrote certain URLs. An
unauthenticated user could use a specially-crafted HTTP request to obtain
sensitive information about the host system RHN Satellite was running on.
They could also use RHN Satellite as a distributed denial of service tool,
forcing it to connect to an arbitrary service at an arbitrary IP address
via a specially-crafted HTTP request. (CVE-2009-0788)

Note: Refer to the Solution section below for manual steps that may be
required to fully address the CVE-2009-0788 issue.

Users of RHN Satellite 5.3 and 5.4 are advised to upgrade to these updated
packages, which contain backported patches to correct these issues. The RHN
Satellite server must be restarted ("rhn-satellite restart") for this
update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

The patch for CVE-2009-0788 includes changes to
"/etc/httpd/conf.d/zz-spacewalk-www.conf". If you have manually edited
this file, this erratum will not overwrite or replace your existing
version, but will create a new file containing the fixes,
"/etc/httpd/conf.d/zz-spacewalk-www.conf.rpmnew". If this .rpmnew file
exists after installing the update, the following steps must be
performed to fully fix CVE-2009-0788:

1) Create a backup copy of your
"/etc/httpd/conf.d/zz-spacewalk-www.conf" file.

2) Carefully review your manual zz-spacewalk-www.conf changes, and
merge those changes into the zz-spacewalk-www.conf.rpmnew file.

3) Once you have merged all your manual changes into
zz-spacewalk-www.conf.rpmnew, save this new version as
"/etc/httpd/conf.d/zz-spacewalk-www.conf", and then restart the RHN
Satellite server ("rhn-satellite restart").

5. Bugs fixed (http://bugzilla.redhat.com/):

491365 - CVE-2009-0788 rhn_satellite: Incorrect mod_rewrite rules (information disclosure, abuse as distributed DoS tool)
584118 - CVE-2010-1171 rhn_satellite: Improper channel comps information management

6. Package List:

Red Hat Network Satellite Server 5.3 (RHEL v.4):

Source:
ftp://updates.redhat.com/enterprise/4AS/en/RHNSAT/SRPMS/spacewalk-backend-0.5.28-59.2.el4sat.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/RHNSAT/SRPMS/spacewalk-config-0.5.9-16.el4sat.src.rpm

noarch:
spacewalk-backend-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-app-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-applet-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-config-files-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-config-files-common-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-config-files-tool-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-iss-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-iss-export-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-package-push-server-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-server-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-sql-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-tools-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-upload-server-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-xml-export-libs-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-xmlrpc-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-backend-xp-0.5.28-59.2.el4sat.noarch.rpm
spacewalk-config-0.5.9-16.el4sat.noarch.rpm

Red Hat Network Satellite Server 5.3 (RHEL v.5):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-backend-0.5.28-59.2.el5sat.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-config-0.5.9-16.el5sat.src.rpm

noarch:
spacewalk-backend-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-app-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-applet-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-config-files-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-config-files-common-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-config-files-tool-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-iss-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-iss-export-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-package-push-server-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-server-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-sql-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-tools-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-upload-server-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-xml-export-libs-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-xmlrpc-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-backend-xp-0.5.28-59.2.el5sat.noarch.rpm
spacewalk-config-0.5.9-16.el5sat.noarch.rpm

Red Hat Network Satellite Server 5.4 (RHEL v.5):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-backend-1.2.13-37.el5sat.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-config-1.2.2-2.el5sat.src.rpm

noarch:
spacewalk-backend-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-app-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-applet-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-config-files-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-config-files-common-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-config-files-tool-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-iss-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-iss-export-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-libs-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-package-push-server-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-server-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-sql-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-sql-oracle-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-tools-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-upload-server-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-xml-export-libs-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-xmlrpc-1.2.13-37.el5sat.noarch.rpm
spacewalk-backend-xp-1.2.13-37.el5sat.noarch.rpm
spacewalk-config-1.2.2-2.el5sat.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-0788.html
https://www.redhat.com/security/data/cve/CVE-2010-1171.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFNo2SeXlSAg2UNWIIRAg1mAKCx/KTgoOopUDYWmhDFsXPsY1wATwCgsJEM
ZLuGVgjozltvW6C40njOD3k=
=hYXF
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC