How to Buy
This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Red Hat Subscription Asset Manager 1.2, which fixes several security
issues, multiple bugs, and adds various enhancements, is now
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
Red Hat Subscription Asset Manager acts as a proxy for handling
subscription information and software updates on client machines.
It was discovered that Katello did not properly check user permissions
when handling certain requests. An authenticated remote attacker could
use this flaw to download consumer certificates or change settings of
other users' systems if they knew the target system's UUID.
A vulnerability in rubygem-ldap_fluff allowed a remote attacker to
bypass authentication and log into Subscription Asset Manager when a
Microsoft Active Directory server was used as the back-end
authentication server. (CVE-2012-5604)
It was found that the
'/usr/share/katello/script/katello-generate-passphrase' utility, which
is run during the installation and configuration process, set
world-readable permissions on the '/etc/katello/secure/passphrase'
file. A local attacker could use this flaw to obtain the passphrase
for Katello, giving them access to information they would otherwise
not have access to. (CVE-2012-5561)
Note: After installing this update, ensure the
'/etc/katello/secure/passphrase' file is owned by the root user and
group and mode 0750 permissions. Sites should also consider
re-creating the Katello passphrase as this issue exposed it to local
Three flaws were found in rubygem-rack. A remote attacker could use
these flaws to perform a denial of service attack against applications
using rubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)
A flaw was found in the way rubygem-activerecord dynamic finders
extracted options from method parameters. A remote attacker could
possibly use this flaw to perform SQL injection attacks against
applications using the Active Record dynamic finder methods.
It was found that ruby_parser from rubygem-ruby_parser created a
temporary file in an insecure way. A local attacker could use this
flaw to perform a symbolic link attack, overwriting arbitrary files
accessible to the application using ruby_parser. (CVE-2013-0162)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat
CVE-2012-5604 was discovered by Og Maciel of Red Hat
was discovered by Aaron Weitekamp of the Red Hat Cloud Quality
and CVE-2013-0162 was discovered by Michael Scherer
of the Red Hat Regional IT team.
These updated Subscription Asset Manager packages include a number of
bug fixes and enhancements. Space precludes documenting all of these
changes in this advisory. Refer to the Red Hat Subscription Asset
Manager 1.2 Release Notes for information about these changes :
All users of Red Hat Subscription Asset Manager are advised to upgrade
to these updated packages, which fix these issues and add various
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 65172 ()
CVE ID: CVE-2012-5561CVE-2012-5603CVE-2012-5604CVE-2012-6109CVE-2012-6496CVE-2013-0162CVE-2013-0183CVE-2013-0184
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.