RHEL 5 : conga (RHSA-2007:0640)

high Nessus Plugin ID 63842

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2007:0640 advisory.

The Conga package is a web-based administration tool for remote cluster and storage management.

A flaw was found in ricci during a code audit. A remote attacker who is able to connect to ricci could cause ricci to temporarily refuse additional connections, a denial of service (CVE-2007-4136).

Fixes in this updated package include:

* The nodename is now set for manual fencing.

* The node log no longer displays in random order.

* A bug that prevented a node from responding when a cluster was deleted is now fixed.

* A PAM configuration that incorrectly called the deprecated module pam_stack was removed.

* A bug that prevented some quorum disk configurations from being accepted is now fixed.

* Setting multicast addresses now works properly.

* rpm -V on luci no longer fails.

* The user interface rendering time for storage interface is now faster.

* An error message that incorrectly appeared when rebooting nodes during cluster creation was removed.

* Cluster snaps configuration (an unsupported feature) has been removed altogether to prevent user confusion.

* A user permission bug resulting from a luci code error is now fixed.

* luci and ricci init script return codes are now LSB-compliant.

* VG creation on cluster nodes now defaults to clustered.

* An SELinux AVC bug that prevented users from setting up shared storage on nodes is now fixed.

* An access error that occurred when attempting to access a cluster node after its cluster was deleted is now fixed.

* IP addresses can now be used to create clusters.

* Attempting to configure a fence device no longer results in an AttributeError.

* Attempting to create a new fence device to a valid cluster no longer results in a KeyError.

* Several minor user interface validation errors have been fixed, such as enforcing cluster name length and fence port, etc.

* A browser lock-up that could occur during storage configuration has been fixed.

* Virtual service creation now works without error.

* The fence_xvm tag is no longer misspelled in the cluster.conf file.

* Luci failover forms are complete and working.
* Rebooting a fresh cluster install no longer generates an error message.

* A bug that prevented failed cluster services from being started is now fixed.

* A bug that caused some cluster operations (e.g., node delete) to fail on clusters with mixed-cased cluster names is now fixed.

* Global cluster resources can be reused when constructing cluster services.

Enhancements in this updated package include:

* Users can now access Conga through Internet Explorer 6.

* Dead nodes can now be evicted from a cluster.

* Shared storage on new clusters is now enabled by default.

* The fence user-interface flow is now simpler.

* A port number is now shown in ricci error messages.

* The kmod-gfs-xen kernel module is now installed when creating a cluster.

* Cluster creation status is now shown visually.

* User names are now sorted for display.

* The fence_xvmd tag can now be added from the dom0 cluster nodes.

* The ampersand character (&) can now be used in fence names.

* All packaged files are now installed with proper owners and permissions.

* New cluster node members are now properly initialized.

* Storage operations can now be completed even if an LVM snapshot is present.

* Users are now informed via dialog when nodes are rebooted as part of a cluster operation.

* Failover domains are now properly listed for virtual services and traditional clustered services.

* Luci can now create and distribute keys for fence_xvmd.

All Conga users are advised to upgrade to this update, which applies these fixes and enhancements.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected luci and / or ricci packages.

See Also

http://www.nessus.org/u?6709afa6

https://access.redhat.com/errata/RHSA-2007:0640

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=212006

https://bugzilla.redhat.com/show_bug.cgi?id=212022

https://bugzilla.redhat.com/show_bug.cgi?id=213083

https://bugzilla.redhat.com/show_bug.cgi?id=218964

https://bugzilla.redhat.com/show_bug.cgi?id=221899

https://bugzilla.redhat.com/show_bug.cgi?id=222051

https://bugzilla.redhat.com/show_bug.cgi?id=223162

https://bugzilla.redhat.com/show_bug.cgi?id=224011

https://bugzilla.redhat.com/show_bug.cgi?id=225164

https://bugzilla.redhat.com/show_bug.cgi?id=225206

https://bugzilla.redhat.com/show_bug.cgi?id=225588

https://bugzilla.redhat.com/show_bug.cgi?id=225747

https://bugzilla.redhat.com/show_bug.cgi?id=225782

https://bugzilla.redhat.com/show_bug.cgi?id=226700

https://bugzilla.redhat.com/show_bug.cgi?id=227682

https://bugzilla.redhat.com/show_bug.cgi?id=227743

https://bugzilla.redhat.com/show_bug.cgi?id=227758

https://bugzilla.redhat.com/show_bug.cgi?id=227852

https://bugzilla.redhat.com/show_bug.cgi?id=229027

https://bugzilla.redhat.com/show_bug.cgi?id=230447

https://bugzilla.redhat.com/show_bug.cgi?id=230452

https://bugzilla.redhat.com/show_bug.cgi?id=230454

https://bugzilla.redhat.com/show_bug.cgi?id=230457

https://bugzilla.redhat.com/show_bug.cgi?id=230461

https://bugzilla.redhat.com/show_bug.cgi?id=230469

https://bugzilla.redhat.com/show_bug.cgi?id=238655

https://bugzilla.redhat.com/show_bug.cgi?id=238726

https://bugzilla.redhat.com/show_bug.cgi?id=239327

https://bugzilla.redhat.com/show_bug.cgi?id=239388

https://bugzilla.redhat.com/show_bug.cgi?id=239389

https://bugzilla.redhat.com/show_bug.cgi?id=240034

https://bugzilla.redhat.com/show_bug.cgi?id=240361

https://bugzilla.redhat.com/show_bug.cgi?id=241415

https://bugzilla.redhat.com/show_bug.cgi?id=241418

https://bugzilla.redhat.com/show_bug.cgi?id=241706

https://bugzilla.redhat.com/show_bug.cgi?id=241727

https://bugzilla.redhat.com/show_bug.cgi?id=242668

https://bugzilla.redhat.com/show_bug.cgi?id=243701

https://bugzilla.redhat.com/show_bug.cgi?id=244146

https://bugzilla.redhat.com/show_bug.cgi?id=244878

https://bugzilla.redhat.com/show_bug.cgi?id=245202

https://bugzilla.redhat.com/show_bug.cgi?id=248317

https://bugzilla.redhat.com/show_bug.cgi?id=249066

https://bugzilla.redhat.com/show_bug.cgi?id=249086

https://bugzilla.redhat.com/show_bug.cgi?id=249091

https://bugzilla.redhat.com/show_bug.cgi?id=249291

https://bugzilla.redhat.com/show_bug.cgi?id=249641

https://bugzilla.redhat.com/show_bug.cgi?id=249868

https://bugzilla.redhat.com/show_bug.cgi?id=250443

https://bugzilla.redhat.com/show_bug.cgi?id=250834

https://bugzilla.redhat.com/show_bug.cgi?id=253914

https://bugzilla.redhat.com/show_bug.cgi?id=253994

https://bugzilla.redhat.com/show_bug.cgi?id=254038

https://bugzilla.redhat.com/show_bug.cgi?id=336101

Plugin Details

Severity: High

ID: 63842

File Name: redhat-RHSA-2007-0640.nasl

Version: 1.10

Type: local

Agent: unix

Published: 1/24/2013

Updated: 3/20/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2007-4136

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:conga, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:ricci, p-cpe:/a:redhat:enterprise_linux:luci

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/7/2007

Reference Information

CVE: CVE-2007-4136

RHSA: 2007:0640