RHEL 6 : Red Hat Enterprise MRG Grid 2.2 (RHSA-2012:1281)

high Nessus Plugin ID 76651

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat Enterprise MRG Grid 2.2.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2012:1281 advisory.

- cumin: authentication bypass flaws (CVE-2012-2680)

- cumin: weak session keys (CVE-2012-2681)

- cumin: multiple XSS flaws (CVE-2012-2683)

- cumin: SQL injection flaw (CVE-2012-2684)

- cumin: DoS via large image requests (CVE-2012-2685)

- cumin: CSRF flaw (CVE-2012-2734)

- cumin: session fixation flaw (CVE-2012-2735)

- cumin: allows for editing internal Condor job attributes (CVE-2012-3459)

- condor: local users can abort any idle jobs (CVE-2012-3491)

- condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass (CVE-2012-3492)

- condor: GIVE_REQUEST_AD leaks privileged ClaimId information (CVE-2012-3493)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat Enterprise MRG Grid 2.2 package based on the guidance in RHSA-2012:1281.

See Also

http://www.nessus.org/u?46b792d8

http://www.nessus.org/u?9d4e1de3

https://access.redhat.com/errata/RHSA-2012:1281

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=827558

https://bugzilla.redhat.com/show_bug.cgi?id=828434

https://bugzilla.redhat.com/show_bug.cgi?id=829421

https://bugzilla.redhat.com/show_bug.cgi?id=830243

https://bugzilla.redhat.com/show_bug.cgi?id=830245

https://bugzilla.redhat.com/show_bug.cgi?id=830248

https://bugzilla.redhat.com/show_bug.cgi?id=832124

https://bugzilla.redhat.com/show_bug.cgi?id=832151

https://bugzilla.redhat.com/show_bug.cgi?id=846501

https://bugzilla.redhat.com/show_bug.cgi?id=848212

https://bugzilla.redhat.com/show_bug.cgi?id=848214

https://bugzilla.redhat.com/show_bug.cgi?id=848218

https://bugzilla.redhat.com/show_bug.cgi?id=848222

Plugin Details

Severity: High

ID: 76651

File Name: redhat-RHSA-2012-1281.nasl

Version: 1.16

Type: local

Agent: unix

Published: 7/22/2014

Updated: 4/21/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2012-2684

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2012-2734

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:condor-plumage, p-cpe:/a:redhat:enterprise_linux:rubygem-thin, p-cpe:/a:redhat:enterprise_linux:python-wallaby, p-cpe:/a:redhat:enterprise_linux:rubygem-sinatra, p-cpe:/a:redhat:enterprise_linux:condor-qmf, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rubygem-json, p-cpe:/a:redhat:enterprise_linux:rubygem-daemons, p-cpe:/a:redhat:enterprise_linux:deltacloud-core, p-cpe:/a:redhat:enterprise_linux:rubygem-rack-test, p-cpe:/a:redhat:enterprise_linux:condor, p-cpe:/a:redhat:enterprise_linux:condor-cluster-resource-agent, p-cpe:/a:redhat:enterprise_linux:ruby-hpricot, p-cpe:/a:redhat:enterprise_linux:condor-wallaby-client, p-cpe:/a:redhat:enterprise_linux:condor-wallaby-base-db, p-cpe:/a:redhat:enterprise_linux:rubygem-nokogiri, p-cpe:/a:redhat:enterprise_linux:wallaby-utils, p-cpe:/a:redhat:enterprise_linux:rubygem-tilt-doc, p-cpe:/a:redhat:enterprise_linux:rubygem-fssm, p-cpe:/a:redhat:enterprise_linux:ruby-nokogiri, p-cpe:/a:redhat:enterprise_linux:libdeltacloud, p-cpe:/a:redhat:enterprise_linux:rubygem-haml, p-cpe:/a:redhat:enterprise_linux:rubygem-rest-client, p-cpe:/a:redhat:enterprise_linux:condor-classads, p-cpe:/a:redhat:enterprise_linux:rubygem-eventmachine, p-cpe:/a:redhat:enterprise_linux:rubygem-nokogiri-doc, p-cpe:/a:redhat:enterprise_linux:rubygem-rack-accept-doc, p-cpe:/a:redhat:enterprise_linux:libdeltacloud-devel, p-cpe:/a:redhat:enterprise_linux:sesame, p-cpe:/a:redhat:enterprise_linux:rubygem-rack-accept, p-cpe:/a:redhat:enterprise_linux:condor-deltacloud-gahp, p-cpe:/a:redhat:enterprise_linux:rubygem-tilt, p-cpe:/a:redhat:enterprise_linux:rubygem-yard, p-cpe:/a:redhat:enterprise_linux:deltacloud-core-rhevm, p-cpe:/a:redhat:enterprise_linux:condor-kbdd, p-cpe:/a:redhat:enterprise_linux:condor-vm-gahp, p-cpe:/a:redhat:enterprise_linux:cumin, p-cpe:/a:redhat:enterprise_linux:deltacloud-core-doc, p-cpe:/a:redhat:enterprise_linux:wallaby, p-cpe:/a:redhat:enterprise_linux:condor-wallaby-tools, p-cpe:/a:redhat:enterprise_linux:rubygem-thin-doc, p-cpe:/a:redhat:enterprise_linux:rubygem-net-ssh-doc, p-cpe:/a:redhat:enterprise_linux:condor-wallaby, p-cpe:/a:redhat:enterprise_linux:rubygem-sass-doc, p-cpe:/a:redhat:enterprise_linux:rubygems, p-cpe:/a:redhat:enterprise_linux:condor-aviary, p-cpe:/a:redhat:enterprise_linux:rubygem-mime-types-doc, p-cpe:/a:redhat:enterprise_linux:rubygem-maruku, p-cpe:/a:redhat:enterprise_linux:rubygem-mocha, p-cpe:/a:redhat:enterprise_linux:ruby-json, p-cpe:/a:redhat:enterprise_linux:rubygem-rake, p-cpe:/a:redhat:enterprise_linux:rubygem-syntax, p-cpe:/a:redhat:enterprise_linux:rubygem-hpricot, p-cpe:/a:redhat:enterprise_linux:rubygem-hpricot-doc, p-cpe:/a:redhat:enterprise_linux:rubygem-net-ssh, p-cpe:/a:redhat:enterprise_linux:rubygem-sass, p-cpe:/a:redhat:enterprise_linux:rubygem-mime-types, p-cpe:/a:redhat:enterprise_linux:python-wallabyclient, p-cpe:/a:redhat:enterprise_linux:ruby-wallaby, p-cpe:/a:redhat:enterprise_linux:rubygem-rack

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/19/2012

Vulnerability Publication Date: 9/28/2012

Reference Information

CVE: CVE-2012-2680, CVE-2012-2681, CVE-2012-2683, CVE-2012-2684, CVE-2012-2685, CVE-2012-2734, CVE-2012-2735, CVE-2012-3459, CVE-2012-3491, CVE-2012-3492, CVE-2012-3493

BID: 55632

CWE: 352, 384, 79

RHSA: 2012:1281