Executive Summary
Summary | |
---|---|
Title | yum-rhn-plugin security update |
Informations | |||
---|---|---|---|
Name | RHSA-2008:0815 | First vendor Publication | 2008-08-14 |
Vendor | RedHat | Last vendor Modification | 2008-08-14 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated yum-rhn-plugin packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - noarch Red Hat Enterprise Linux (v. 5 server) - noarch 3. Description: The yum-rhn-plugin provides support for yum to securely access a Red Hat Network (RHN) server for software updates. It was discovered that yum-rhn-plugin did not verify the SSL certificate for all communication with a Red Hat Network server. An attacker able to redirect the network communication between a victim and an RHN server could use this flaw to provide malicious repository metadata. This metadata could be used to block the victim from receiving specific security updates. (CVE-2008-3270) This flaw did not allow an attacker to install malicious packages. Package signatures were verified and only packages signed with a trusted Red Hat GPG key were installed. Red Hat would like to thank Justin Samuel for discussing various package update mechanism flaws which led to our discovery of this issue. Users of yum-rhn-plugin are advised to upgrade to this updated packages, which resolves this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 457113 - CVE-2008-3270 yum-rhn-plugin: does not verify SSL certificate for all communication with RHN server |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2008-0815.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10864 | |||
Oval ID: | oval:org.mitre.oval:def:10864 | ||
Title: | yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested. | ||
Description: | yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-3270 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21730 | |||
Oval ID: | oval:org.mitre.oval:def:21730 | ||
Title: | ELSA-2008:0815: yum-rhn-plugin security update (Moderate) | ||
Description: | yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0815-02 CVE-2008-3270 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | yum-rhn-plugin |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28842 | |||
Oval ID: | oval:org.mitre.oval:def:28842 | ||
Title: | RHSA-2008:0815 -- yum-rhn-plugin security update (Moderate) | ||
Description: | Updated yum-rhn-plugin packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The yum-rhn-plugin provides support for yum to securely access a Red Hat Network (RHN) server for software updates. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2008:0815 CVE-2008-3270 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | yum-rhn-plugin |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-03-06 | Name : RedHat Update for yum-rhn-plugin RHSA-2008:0815-01 File : nvt/gb_RHSA-2008_0815-01_yum-rhn-plugin.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
47661 | Red Hat Enterprise Linux yum-rhn-plugin SSL Certificate Verification Failure ... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20080814_yum_rhn_plugin_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2008-08-15 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2008-0815.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:51:54 |
|