Scientific Linux Security Update : sos on SL5.x (noarch) (20130730)

medium Nessus Plugin ID 69167

Synopsis

The remote Scientific Linux host is missing a security update.

Description

The sosreport utility collected the Kickstart configuration file ('/root /anaconda-ks.cfg'), but did not remove the root user's password from it before adding the file to the resulting archive of debugging information. An attacker able to access the archive could possibly use this flaw to obtain the root user's password.
'/root/anaconda-ks.cfg' usually only contains a hash of the password, not the plain text password. (CVE-2012-2664)

Note: This issue affected all installations, not only systems installed via Kickstart. A '/root/anaconda-ks.cfg' file is created by all installation types.

The utility also collects yum repository information from '/etc/yum.repos.d' which in uncommon configurations may contain passwords. Any http_proxy password specified in these files will now be automatically removed. Passwords embedded within URLs in these files should be manually removed or the files excluded from the archive.

Solution

Update the affected sos package.

See Also

http://www.nessus.org/u?4b575d82

Plugin Details

Severity: Medium

ID: 69167

File Name: sl_20130730_sos_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 7/31/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:sos, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 7/30/2013

Vulnerability Publication Date: 6/29/2012

Reference Information

CVE: CVE-2012-2664