RHEL 5 / 6 : spacewalk-backend (RHSA-2012:0101)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated spacewalk-backend packages that fix one security issue and two
bugs are now available for Red Hat Network Satellite 5.4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Red Hat Network (RHN) Satellite is a systems management tool for
Linux-based infrastructures. It allows for provisioning, monitoring,
and remote management of multiple Linux deployments with a single,
centralized tool.

If a user submitted a system registration XML-RPC call to an RHN
Satellite server (for example, by running 'rhnreg_ks') and that call
failed, their RHN user password was included in plain text in the
error messages both stored in the server log and mailed to the server
administrator. With this update, user passwords are excluded from
these error messages to avoid the exposure of authentication
credentials. (CVE-2012-0059)

This update also fixes the following bugs :

* When activating a new RHN Satellite certificate that has less
entitlements than is currently used or allotted on the Satellite
server, the error message notified the user only about the first
problem encountered and did not include directions for resolution.
With this update, more verbose error messages are shown in this
scenario. (BZ#209514, BZ#704623)

All users of Red Hat Network Satellite are advised to upgrade to these
updated packages, which correct these issues. For this update to take
effect, Red Hat Network Satellite must be restarted. Refer to the
Solution section for details.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 64024 ()

Bugtraq ID: 51569

CVE ID: CVE-2012-0059

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now