Scientific Linux Security Update : sos on SL5.x (noarch)

Medium Nessus Plugin ID 69167

Synopsis

The remote Scientific Linux host is missing a security update.

Description

The sosreport utility collected the Kickstart configuration file ('/root /anaconda-ks.cfg'), but did not remove the root user's password from it before adding the file to the resulting archive of debugging information. An attacker able to access the archive could possibly use this flaw to obtain the root user's password.
'/root/anaconda-ks.cfg' usually only contains a hash of the password, not the plain text password. (CVE-2012-2664)

Note: This issue affected all installations, not only systems installed via Kickstart. A '/root/anaconda-ks.cfg' file is created by all installation types.

The utility also collects yum repository information from '/etc/yum.repos.d' which in uncommon configurations may contain passwords. Any http_proxy password specified in these files will now be automatically removed. Passwords embedded within URLs in these files should be manually removed or the files excluded from the archive.

Solution

Update the affected sos package.

See Also

http://www.nessus.org/u?4b575d82

Plugin Details

Severity: Medium

ID: 69167

File Name: sl_20130730_sos_on_SL5_x.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2013/07/31

Updated: 2018/12/31

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/07/30

Reference Information

CVE: CVE-2012-2664