RHEL 5 : yum-rhn-plugin (RHSA-2008:0815)

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated yum-rhn-plugin packages that fix a security issue are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

The yum-rhn-plugin provides support for yum to securely access a Red
Hat Network (RHN) server for software updates.

It was discovered that yum-rhn-plugin did not verify the SSL
certificate for all communication with a Red Hat Network server. An
attacker able to redirect the network communication between a victim
and an RHN server could use this flaw to provide malicious repository
metadata. This metadata could be used to block the victim from
receiving specific security updates. (CVE-2008-3270)

This flaw did not allow an attacker to install malicious packages.
Package signatures were verified and only packages signed with a
trusted Red Hat GPG key were installed.

Red Hat would like to thank Justin Cappos and Justin Samuel for
discussing various package update mechanism flaws which led to our
discovery of this issue.

Users of yum-rhn-plugin are advised to upgrade to this updated
packages, which resolves this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2008-3270.html
http://rhn.redhat.com/errata/RHSA-2008-0815.html

Solution :

Update the affected yum-rhn-plugin package.

Risk factor :

Low / CVSS Base Score : 2.6
(CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 33892 ()

Bugtraq ID:

CVE ID: CVE-2008-3270