Executive Summary

Summary
Title SUSE WebYaST remotely accessible hosts list vulnerability
Informations
Name VU#806908 First vendor Publication 2013-01-25
Vendor VU-CERT Last vendor Modification 2013-01-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Cvss Base Score 5.8 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#806908

SUSE WebYaST remotely accessible hosts list vulnerability

Original Release date: 25 Jan 2013 | Last revised: 25 Jan 2013

Overview

The WebYaST hosts list is remotely accessible by unauthenticated attackers. An attacker may be able to add a malicious host to the list and perform a man-in-the-middle attack against WebYaST.

Description

The SUSE security advisory states:

    The hosts list used by WebYaST for connecting to it's back end part was modifiable allowing to point to a malicious website which then could access all values sent by WebYaST. The /host configuration path was removed to fix this issue.


Additional details may be found in advisory SUSE-SU-2013:0053-1.

Impact

A remote unauthenticated attacker may be able to add a malicious server to the WebYaST hosts file and then be able to perform a man-in-the-middle attack against WebYaST.

Solution

Apply an Update

WebYaST patch slewyst12-webyast-base-ui-7236 has been released to address this vulnerability.

Restrict Access

Firewall rules to block untrusted networks and hosts from accessing TCP port 4984 should be implemented.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Novell, Inc.Affected28 Nov 201225 Jan 2013
SUSE LinuxAffected-25 Jan 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.4AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal5.0E:POC/RL:OF/RC:C
Environmental4.9CDP:LM/TD:M/CR:M/IR:M/AR:L

References

  • http://support.novell.com/security/cve/CVE-2012-0435.html
  • http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00008.html

Credit

Thanks to Tenable Network Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-0435
  • Date Public:23 Jan 2013
  • Date First Published:25 Jan 2013
  • Date Last Updated:25 Jan 2013
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/806908

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Nessus® Vulnerability Scanner

Date Description
2013-01-25 Name : The application hosted on the remote web server is vulnerable to a man-in-the...
File : webyast_mitm.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 12:08:11
  • Multiple Updates
2013-01-28 21:19:43
  • Multiple Updates
2013-01-27 13:20:36
  • Multiple Updates
2013-01-26 00:17:59
  • First insertion