SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Red Hat Enterprise Virtualization Manager Vendors:   Red Hat
Red Hat Enterprise Virtualization Manager Lets Local Users Obtain Passwords and Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1028076
SecurityTracker URL:  http://securitytracker.com/id/1028076
CVE Reference:   CVE-2012-6115, CVE-2013-0168   (Links to External Site)
Date:  Feb 5 2013
Impact:   Denial of service via network, Disclosure of authentication information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.1
Description:   Two vulnerabilities were reported in Red Hat Enterprise Virtualization Manager. A local user can obtain passwords. A remote authenticated user can cause denial of service conditions.

When the domain management tool is run with the validate action ('rhevm-manage-domains -action=validate'), the system logs administrative passwords to a world-readable log file [CVE-2012-6115]. A local user can obtain passwords and then gain control of target systems that are managed by the Red Hat Enterprise Virtualization Manager.

Andrew Cathrow of Red Hat reported this vulnerability.

A remote authenticated user with sufficient privileges (e.g., storage admin user of a storage domain) can exploit a permission checking flaw in the MoveDisk command to consume all available free space in a different storage domain that they do not have permissions for [CVE-2013-0168].

Ondrej Machacek of Red Hat reported this vulnerability.

Impact:   A remote authenticated user can consume excessive disk space on the target system.

A local user can obtain passwords.

Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2013-0211.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2013-0211.html (Links to External Site)
Cause:   Access control error, State error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Date:  Tue, 5 Feb 2013 00:10:07 +0000
Subject:  [RHSA-2013:0211-01] Moderate: rhevm 3.1.2 security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rhevm 3.1.2 security and bug fix update
Advisory ID:       RHSA-2013:0211-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0211.html
Issue date:        2013-02-04
CVE Names:         CVE-2012-6115 CVE-2013-0168 
=====================================================================

1. Summary:

Updated rhevm packages that fix two security issues and various bugs are
now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEV-M 3.1 - noarch

3. Description:

The Red Hat Enterprise Virtualization Manager is a centralized management
platform that allows system administrators to view and manage virtual
machines. The Red Hat Enterprise Virtualization Manager provides a
comprehensive range of features including search capabilities, resource
management, live migrations, and virtual infrastructure provisioning. The
Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface
(API).

It was discovered that running the domain management tool with the validate
action ("rhevm-manage-domains -action=validate") logged administrative
passwords to a world-readable log file. A local attacker could use this
flaw to gain control of systems that are managed by Red Hat Enterprise
Virtualization Manager. (CVE-2012-6115)

A flaw was found in the way the MoveDisk command checked permissions on the
target storage domain. A privileged user (a storage admin of a storage
domain) could use this flaw to exhaust all available free space in another
storage domain they would otherwise not have access to. (CVE-2013-0168)

The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat. The
CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.

Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to
3.1 was not formally supported by Red Hat. This update fixes a number of
known issues with the upgrade process. As a result, upgrading from Red Hat
Enterprise Virtualization Manager 3.0 to 3.1 is now supported.

For more information on upgrading to Red Hat Enterprise Virtualization
Manager 3.1, consult the Installation Guide:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

Additional tips and considerations to take into account are also available
in the Red Hat Knowledgebase:

https://access.redhat.com/knowledge/articles/269333

Information on the bugs fixed in this update is available in the Technical
Notes document:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/chap-RHSA-2013-0211.html

All Red Hat Enterprise Virtualization Manager administrators are advised to
install these updated packages, which fix these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

5. Bugs fixed (http://bugzilla.redhat.com/):

842134 - [Storage] cannot force extend block storage domains (no force extendVG support)
854214 - engine: logging - when domain is partially inaccessible event log does not report which luns are inaccessible
881059 - RESTAPI: RSDL does not document lun-based disks parameters for add()
881121 - [es_ES] heading "Virtual size" is truncated in Spanish [LAYOUT]
881783 - ovrit-engine-backend:.rollbackQuota ignores disabled quota
883893 - [ja_JP] Test case failure: Host Tab [LAYOUT] - "no network assigned" translation doesn't fit a single line
883896 - [ja_JP] Test case failure: Storage Tab: General sub-tab: unnecessary colon (":") between "Used: xxxxGB" line and NFS Export Path
883903 - [es_ES] Event Tab, Advance view 's heading Event is truncated [LAYOUT]
883910 - [ja_JP] Test case failure: Disk Tab: Remove Disk(s) dialog: "[disk-alias] is Bootable and Attached to [n] VM(s)" message structure need to be revised.
883915 - Portal Login button label is not localized
883933 - [zh_CN] Truncation column name on logical networks sub tab [LAYOUT]
886166 - Backend: CPU pinning works only with single-digit CPU's
886520 - Create ISCSI LUN Disk: Connection details should be mandatory
886654 - [ja_JP] Test case failure: Check the message for Alert/Events/Tasks: The Date part of the message contains minutes in the month-section.
887856 - [ja_JP] Test case failure: Virtual Machines [LAYOUT]: New VM dialog -> Resrouce Allocation section -> string "clone" is broken into two lines
887904 - [rhevm-upgrade] during upgrade rhev-guest-tools-iso is not updated to latest version and remains with old version
888039 - Failed Hot-Plug and Hot-UnPlug Direct LUN in FC DC environment
888309 - Importing a VM from an OVF without the diskAlias property with copyCollapse=false will not auto-generate disk aliases
888317 - [engine] [upgrade] Unable to perform operations as user on existing VM after upgrade from RHEV 3.0 to 3.1
888785 - [RHEVM Web Admin Portal localization] Zanata source strings (rhevm-3.1 version) containing "oVirt" and "Engine"
889792 - 'Configure Local Disk' does not work properly in Japanese environment
891631 - rhevm-upgrade must check for enough disk space to perform an upgrade before starting the upgrade
893355 - CVE-2013-0168 rhev-m: insufficient MoveDisk target domain permission checks
902341 - [User Portal] An user with UserRole assigned to a pool does not see pool's VMs
905865 - CVE-2012-6115 rhev: rhevm-manage-domains logs admin passwords

6. Package List:

RHEV-M 3.1:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEV/SRPMS/rhevm-3.1.0-43.el6ev.src.rpm

noarch:
rhevm-3.1.0-43.el6ev.noarch.rpm
rhevm-backend-3.1.0-43.el6ev.noarch.rpm
rhevm-config-3.1.0-43.el6ev.noarch.rpm
rhevm-dbscripts-3.1.0-43.el6ev.noarch.rpm
rhevm-genericapi-3.1.0-43.el6ev.noarch.rpm
rhevm-notification-service-3.1.0-43.el6ev.noarch.rpm
rhevm-restapi-3.1.0-43.el6ev.noarch.rpm
rhevm-setup-3.1.0-43.el6ev.noarch.rpm
rhevm-setup-plugin-allinone-3.1.0-43.el6ev.noarch.rpm
rhevm-tools-common-3.1.0-43.el6ev.noarch.rpm
rhevm-userportal-3.1.0-43.el6ev.noarch.rpm
rhevm-webadmin-portal-3.1.0-43.el6ev.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-6115.html
https://www.redhat.com/security/data/cve/CVE-2013-0168.html
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/chap-RHSA-2013-0211.html
https://access.redhat.com/knowledge/articles/269333

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFREE3LXlSAg2UNWIIRAh+TAJ0TXJhqM491GBV6F3Hfda0S8ZhbWwCgwP/y
/Dazn2rr38rSvr7OBNbdM1I=
=0BTD
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC