[RedHat] Schwachstelle in den Red Hat Network Client Tools - RHSA-2010:0449-01

WiN Site Security Contacts win-sec-ssc at lists.dfn-cert.de
Mi Jun 2 11:49:37 CEST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgendes RedHat Security Advisory. Wir geben
diese Informationen unveraendert an Sie weiter.

CVE-2010-1439 - Schwachstelle in den Red Hat Network Client Tools

  Aufgrund eines Fehlers des in Red Hat enthaltenen yum-rhn Plugins
  werden vertrauliche Daten, welche den Update-Prozess betreffen in die
  global lesbare Datei /var/spool/up2date/up2datenAuth.pkl geschrieben.
  Grund hierfuer ist ein Fehler bei der Rechtevergabe auf diesen Dateien.
  Ein Angreifer kann diese Schwachstelle ausnutzen um Pakete aus dem Red
  Hat Network herunter zu laden oder um die Paketliste zu veraendern, was
  die Installation von Updates verhindern koennte.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Paket rhn-client-tools

  Red Hat Enterprise Linux (v. 5 server) - noarch
  Red Hat Enterprise Linux Desktop (v. 5 client) - noarch
  

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  https://rhn.redhat.com/errata/RHSA-2010-0449.html


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
   Michael Groening, DFN-CERT
- -- 

Michael Groening (Incident Response Team)

DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone  +49 40 808077-590
Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.:  DE 232129737
Sachsenstrasse 5, 20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski

Automatische Warnmeldungen               https://www.cert.dfn.de/autowarn

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rhn-client-tools security update
Advisory ID:       RHSA-2010:0449-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0449.html
Issue date:        2010-06-01
CVE Names:         CVE-2010-1439 
=====================================================================

1. Summary:

Updated rhn-client-tools packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - noarch
Red Hat Enterprise Linux Desktop (v. 5 client) - noarch

3. Description:

Red Hat Network Client Tools provide programs and libraries that allow your
system to receive software updates from the Red Hat Network (RHN).

It was discovered that rhn-client-tools set insecure permissions on the
loginAuth.pkl file, used to store session credentials for authenticating
connections to Red Hat Network servers. A local, unprivileged user could
use these credentials to download packages from the Red Hat Network. They
could also manipulate package or action lists associated with the system's
profile. (CVE-2010-1439)

Users of rhn-client-tools are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

585386 - CVE-2010-1439 rhn-client-tools: authorized information disclosure

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/rhn-client-tools-0.4.20-33.el5_5.2.src.rpm

noarch:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/rhn-client-tools-0.4.20-33.el5_5.2.src.rpm

noarch:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-1439.html
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFMBVgnXlSAg2UNWIIRAoW7AKCbO8acpkoOLi5b494hvH8NVXOvVQCgkMns
CgWbdTxtQ7GOjibKcOeeRrQ=
=UnCV
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFMBikxWmhIvjFb90URAq8YAJ9hmKVW0i+YdFgd23MXT163TetoYQCggzkB
HK+KQFmki4tp81JW+oOaEVo=
=P1vZ
-----END PGP SIGNATURE-----