RHEL 6 : rhevm (RHSA-2013:1210)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated rhevm packages that fix one security issue and various bugs
are now available.

The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.

The Red Hat Enterprise Virtualization Manager is a centralized
management platform that allows system administrators to view and
manage virtual machines. The Manager provides a comprehensive range of
features including search capabilities, resource management, live
migrations, and virtual infrastructure provisioning.

The Manager is a JBoss Application Server application that provides
several interfaces through which the virtual environment can be
accessed and interacted with, including an Administration Portal, a
User Portal, and a Representational State Transfer (REST) Application
Programming Interface (API).

A reflected cross-site scripting (XSS) flaw was found in Red Hat
Enterprise Virtualization Manager. An attacker could construct a
carefully-crafted URL, which once visited by an unsuspecting user,
could cause the user's web browser to execute malicious script in the
context of the Red Hat Enterprise Virtualization Manager domain.
(CVE-2013-4181)

Red Hat would like to thank Kayhan KAYIHAN of Endersys A.S. for
reporting this issue.

A list of the bugs fixed in this update is available in the Technical
Notes document :

https://access.redhat.com/site/documentation/en-US/
Red_Hat_Enterprise_Virtualization/3.2/html/Technical_Notes/
chap-RHSA-2013-1210.html

All Red Hat Enterprise Virtualization Manager users are advised to
upgrade to these updated packages, which resolve these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2013-4181.html
https://access.redhat.com/site/documentation/en-US/
http://rhn.redhat.com/errata/RHSA-2013-1210.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:U/RC:ND)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 78971 ()

Bugtraq ID: 73648

CVE ID: CVE-2013-4181

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now