Executive Summary

Informations
NameCVE-2019-3891First vendor Publication2019-04-15
VendorCveLast vendor Modification2019-05-14

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score2.1Attack RangeLocal
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

It was discovered that a world-readable log file belonging to Candlepin component of Red Hat Satellite 6.4 leaked the credentials of the Candlepin database. A malicious user with local access to a Satellite host can use those credentials to modify the database and prevent Satellite from fetching package updates, thus preventing all Satellite hosts from accessing those updates.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3891

CWE : Common Weakness Enumeration

%idName
50 %CWE-532Information Leak Through Log Files
50 %CWE-255Credentials Management

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Sources (Detail)

SourceUrl
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3891
REDHAT https://access.redhat.com/errata/RHSA-2019:1222

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-05-14 21:19:30
  • Multiple Updates
2019-04-16 00:19:01
  • Multiple Updates
2019-04-15 17:18:51
  • First insertion