SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Red Hat Network Satellite Server Vendors:   Red Hat
Red Hat Network Satellite Server Flaws Let Remote Users Conduct Session Fixation and Brute Force Password Guessing Attacks
SecurityTracker Alert ID:  1025116
SecurityTracker URL:  http://securitytracker.com/id/1025116
CVE Reference:   CVE-2011-0717, CVE-2011-0718   (Links to External Site)
Date:  Feb 23 2011
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.4
Description:   Two vulnerabilities were reported in Red Hat Network Satellite Server. A remote user can hijack user sessions. A remote user can conduct brute force password guessing attacks.

A remote user can preset a session cookie in the target user's browser to hijack the target user's session at the next login [CVE-2011-0717].

The server does not enforce a time delay after a failed login attempt [CVE-2011-0718]. A remote user can conduct brute force guessing attacks without delay.

Thomas Biege of the SuSE Security Team reported these vulnerabilities.

Impact:   A remote user can hijack user sessions.

A remote user can conduct brute force password guessing attacks.

Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-0300.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2011-0300.html (Links to External Site)
Cause:   Authentication error, State error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Date:  Wed, 23 Feb 2011 14:12:48 -0500
Subject:  [RHSA-2011:0300-01] Moderate: Red Hat Network Satellite Server security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Network Satellite Server security update
Advisory ID:       RHSA-2011:0300-01
Product:           Red Hat Network Satellite Server
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-0300.html
Issue date:        2011-02-23
CVE Names:         CVE-2011-0717 CVE-2011-0718 
=====================================================================

1. Summary:

Updated packages that fix two security issues are now available for Red Hat
Network Satellite Server 5.4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

5Server-Satellite54 - noarch

3. Description:

Red Hat Network Satellite Server (RHN Satellite Server) is a system
management tool for Linux-based infrastructures. It allows for the
provisioning, remote management and monitoring of multiple Linux
deployments with a single, centralized tool.

A session fixation flaw was found in the way RHN Satellite Server handled
session cookies. An RHN Satellite Server user able to pre-set the session
cookie in a victim's browser to a valid value could use this flaw to hijack
the victim's session after the next log in. (CVE-2011-0717)

A flaw was found in the way RHN Satellite Server managed user
authentication. A time delay was not inserted after each failed log in,
which could allow a remote attacker to conduct a password guessing attack
efficiently. (CVE-2011-0718)

Red Hat would like to thank Thomas Biege of the SuSE Security Team for
reporting these issues.

Users of RHN Satellite Server 5.4 are advised to upgrade to these updated
packages, which contain backported patches to correct these issues. RHN
Satellite Server must be restarted ("rhn-satellite restart") for this
update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

672159 - CVE-2011-0717 Satellite, Spacewalk: Session fixation flaw
672163 - CVE-2011-0718 Satellite, Spacewalk: Prone to brute force password guessing attacks

6. Package List:

5Server-Satellite54:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-backend-1.2.13-26.2.el5sat.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/spacewalk-java-1.2.39-35.1.el5sat.src.rpm

noarch:
spacewalk-backend-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-app-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-applet-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-config-files-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-config-files-common-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-config-files-tool-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-iss-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-iss-export-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-libs-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-package-push-server-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-server-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-sql-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-sql-oracle-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-tools-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-upload-server-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-xml-export-libs-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-xmlrpc-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-backend-xp-1.2.13-26.2.el5sat.noarch.rpm
spacewalk-java-1.2.39-35.1.el5sat.noarch.rpm
spacewalk-java-config-1.2.39-35.1.el5sat.noarch.rpm
spacewalk-java-lib-1.2.39-35.1.el5sat.noarch.rpm
spacewalk-java-oracle-1.2.39-35.1.el5sat.noarch.rpm
spacewalk-taskomatic-1.2.39-35.1.el5sat.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-0717.html
https://www.redhat.com/security/data/cve/CVE-2011-0718.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFNZVtdXlSAg2UNWIIRAgTdAJ9twBhSNH8uihMUVPCaiqCnc+k/owCgwKzf
/LlhG0c8x2lPi/Nz8j95DXI=
=Jlyv
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC