RHEL 6 : CloudForms System Engine 1.1.2 update (Moderate) (RHSA-2013:0547)

medium Nessus Plugin ID 210166

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2013:0547 advisory.

Red Hat CloudForms is an on-premise hybrid cloud Infrastructure-as-a-Service (IaaS) product that lets you create and manage private and public clouds. It provides self-service computing resources to users in a managed, governed, and secure way. CloudForms System Engine can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments.

It was found that the /usr/share/katello/script/katello-generate-passphrase utility, which is run during the installation and configuration process, set world-readable permissions on the /etc/katello/secure/passphrase file. A local attacker could use this flaw to obtain the passphrase for Katello, giving them access to information they would otherwise not have access to.
(CVE-2012-5561)

Note: After installing this update, ensure the /etc/katello/secure/passphrase file is owned by the root user and group and mode 0750 permissions. Sites should also consider re-creating the Katello passphrase as this issue exposed it to local users.

One task the katello-configure utility performs is creating an RPM to be installed on client machines that need to connect to the Katello server. It was found that this RPM set world-readable and writable permissions on the pem file (containing the Certificate Authority certificate) used for trusting the Katello server. An attacker could use this flaw to perform a man-in-the-middle attack, allowing them to manage (such as installing and removing software) Katello client systems. (CVE-2012-6116)

The CVE-2012-5561 issue was discovered by Aaron Weitekamp of the Red Hat Cloud Quality Engineering team, and CVE-2012-6116 was discovered by Dominic Cleal and James Laska of Red Hat.

This update also fixes the following bugs:

* The CloudForms System Engine command line tool incorrectly parsed locales, which caused the following error:

translation missing: de.activerecord.errors.messages.record_invalid

This update replaces the controller for setting the locale. The translation error no longer appears. (BZ#896251)

* Certain locales did not properly escape certain UI content for new role creation. This broke the Save button for some locales. This update corrects the escape behavior for localized UI content. The Save button now works for new role creation. (BZ#896252)

* A missing icon stopped users from deleting recent or saved searches. This update adds the icon and users can now delete recent or saved searches.
(BZ#896253)

* A performance issue in the Candlepin 0.7.8 component caused subscription responsiveness to decrease as the number of systems subscribed to CloudForms System Engine increases. This erratum updates to Candlepin 0.7.19, which corrects the performance issues. (BZ#896261)

* CloudForms System Engine would not fetch Extended Update Service (EUS) entitlements. This blocked the user from seeing and enabling EUS repositories. This update revises the manifest upload and deletion code, which also corrects the behavior for fetching entitlements. System Engine now fetches EUS entitlements. (BZ#896265)

* Issues with menu widths caused the localized UI to not render certain menu items. This update corrects the style for the System Engine UI. The Web UI now renders the menu items correctly. (BZ#903702)

Refer to the CloudForms 1.1.2 Release Notes for further information about this release. The Release Notes will be available shortly from https://access.redhat.com/knowledge/docs/

To upgrade, follow the upgrade instructions in the CloudForms Installation Guide, section 4.1. Upgrading CloudForms System Engine:

https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html

Users of CloudForms System Engine are advised to upgrade to these updated packages.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://access.redhat.com/knowledge/docs/

http://www.nessus.org/u?b59a1d3b

https://bugzilla.redhat.com/show_bug.cgi?id=807455

https://bugzilla.redhat.com/show_bug.cgi?id=879094

https://bugzilla.redhat.com/show_bug.cgi?id=896251

https://bugzilla.redhat.com/show_bug.cgi?id=896253

https://bugzilla.redhat.com/show_bug.cgi?id=896261

https://bugzilla.redhat.com/show_bug.cgi?id=896265

https://bugzilla.redhat.com/show_bug.cgi?id=903702

https://bugzilla.redhat.com/show_bug.cgi?id=904128

https://bugzilla.redhat.com/show_bug.cgi?id=906207

https://bugzilla.redhat.com/show_bug.cgi?id=907250

http://www.nessus.org/u?27bd3c5a

https://access.redhat.com/errata/RHSA-2013:0547

Plugin Details

Severity: Medium

ID: 210166

File Name: redhat-RHSA-2013-0547.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/4/2024

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2012-6116

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2012-5561

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:katello-selinux, p-cpe:/a:redhat:enterprise_linux:katello-configure, p-cpe:/a:redhat:enterprise_linux:katello-glue-pulp, p-cpe:/a:redhat:enterprise_linux:katello-all, p-cpe:/a:redhat:enterprise_linux:katello, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:candlepin-devel, p-cpe:/a:redhat:enterprise_linux:katello-common, p-cpe:/a:redhat:enterprise_linux:katello-glue-candlepin, p-cpe:/a:redhat:enterprise_linux:candlepin, p-cpe:/a:redhat:enterprise_linux:katello-cli, p-cpe:/a:redhat:enterprise_linux:katello-cli-common, p-cpe:/a:redhat:enterprise_linux:katello-api-docs, p-cpe:/a:redhat:enterprise_linux:candlepin-selinux, p-cpe:/a:redhat:enterprise_linux:candlepin-tomcat6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/21/2013

Vulnerability Publication Date: 2/21/2013

Reference Information

CVE: CVE-2012-5561, CVE-2012-6116

RHSA: 2013:0547