RHEL 6 : rhevm (RHSA-2013:1210)

Medium Nessus Plugin ID 78971


The remote Red Hat host is missing one or more security updates.


Updated rhevm packages that fix one security issue and various bugs are now available.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The Red Hat Enterprise Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.

The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).

A reflected cross-site scripting (XSS) flaw was found in Red Hat Enterprise Virtualization Manager. An attacker could construct a carefully-crafted URL, which once visited by an unsuspecting user, could cause the user's web browser to execute malicious script in the context of the Red Hat Enterprise Virtualization Manager domain.

Red Hat would like to thank Kayhan KAYIHAN of Endersys A.S. for reporting this issue.

A list of the bugs fixed in this update is available in the Technical Notes document :

https://access.redhat.com/site/documentation/en-US/ Red_Hat_Enterprise_Virtualization/3.2/html/Technical_Notes/ chap-RHSA-2013-1210.html

All Red Hat Enterprise Virtualization Manager users are advised to upgrade to these updated packages, which resolve these issues.


Update the affected packages.

See Also




Plugin Details

Severity: Medium

ID: 78971

File Name: redhat-RHSA-2013-1210.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2014/11/08

Modified: 2017/01/05

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:U/RC:ND

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rhevm, p-cpe:/a:redhat:enterprise_linux:rhevm-backend, p-cpe:/a:redhat:enterprise_linux:rhevm-config, p-cpe:/a:redhat:enterprise_linux:rhevm-dbscripts, p-cpe:/a:redhat:enterprise_linux:rhevm-genericapi, p-cpe:/a:redhat:enterprise_linux:rhevm-notification-service, p-cpe:/a:redhat:enterprise_linux:rhevm-restapi, p-cpe:/a:redhat:enterprise_linux:rhevm-setup, p-cpe:/a:redhat:enterprise_linux:rhevm-setup-plugin-allinone, p-cpe:/a:redhat:enterprise_linux:rhevm-tools-common, p-cpe:/a:redhat:enterprise_linux:rhevm-userportal, p-cpe:/a:redhat:enterprise_linux:rhevm-webadmin-portal, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/09/10

Reference Information

CVE: CVE-2013-4181

BID: 73648

OSVDB: 97358

RHSA: 2013:1210