Synopsis
The remote Red Hat host is missing one or more security updates.
Description
Updated rhevm packages that fix two security issues and various bugs are now available.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
The Red Hat Enterprise Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Red Hat Enterprise Virtualization Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).
It was discovered that running the domain management tool with the validate action ('rhevm-manage-domains -action=validate') logged administrative passwords to a world-readable log file. A local attacker could use this flaw to gain control of systems that are managed by Red Hat Enterprise Virtualization Manager. (CVE-2012-6115)
A flaw was found in the way the MoveDisk command checked permissions on the target storage domain. A privileged user (a storage admin of a storage domain) could use this flaw to exhaust all available free space in another storage domain they would otherwise not have access to. (CVE-2013-0168)
The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat.
The CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.
Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to 3.1 was not formally supported by Red Hat. This update fixes a number of known issues with the upgrade process. As a result, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to 3.1 is now supported.
For more information on upgrading to Red Hat Enterprise Virtualization Manager 3.1, consult the Installation Guide :
https://access.redhat.com/knowledge/docs/en-US/ Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/ chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html
Additional tips and considerations to take into account are also available in the Red Hat Knowledgebase :
https://access.redhat.com/knowledge/articles/269333
Information on the bugs fixed in this update is available in the Technical Notes document :
https://access.redhat.com/knowledge/docs/en-US/ Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/ chap-RHSA-2013-0211.html
All Red Hat Enterprise Virtualization Manager administrators are advised to install these updated packages, which fix these issues.
Solution
Update the affected packages.
Plugin Details
File Name: redhat-RHSA-2013-0211.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P
Vulnerability Information
CPE: p-cpe:/a:redhat:enterprise_linux:rhevm, p-cpe:/a:redhat:enterprise_linux:rhevm-backend, p-cpe:/a:redhat:enterprise_linux:rhevm-config, p-cpe:/a:redhat:enterprise_linux:rhevm-dbscripts, p-cpe:/a:redhat:enterprise_linux:rhevm-genericapi, p-cpe:/a:redhat:enterprise_linux:rhevm-notification-service, p-cpe:/a:redhat:enterprise_linux:rhevm-restapi, p-cpe:/a:redhat:enterprise_linux:rhevm-setup, p-cpe:/a:redhat:enterprise_linux:rhevm-setup-plugin-allinone, p-cpe:/a:redhat:enterprise_linux:rhevm-tools-common, p-cpe:/a:redhat:enterprise_linux:rhevm-userportal, p-cpe:/a:redhat:enterprise_linux:rhevm-webadmin-portal, cpe:/o:redhat:enterprise_linux:6
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 2/4/2013
Vulnerability Publication Date: 3/12/2013