Bug 457113 (CVE-2008-3270)
Summary: | CVE-2008-3270 yum-rhn-plugin: does not verify SSL certificate for all communication with RHN server | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bkearney, bressers, james.antill, jmatthew, kreilly, mjc, osoukup, pkilambi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-11-13 15:31:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 436804, 457190, 457191 | ||
Bug Blocks: |
Description
Tomas Hoger
2008-07-29 17:55:19 UTC
Note also that the a successful attacker could also not cause existing installed packages to be downgraded to older versions. So a successful attack could only 1) provide the victim with older but official Red Hat packages which the user did not already have installed, or deny them the ability to update specific packages. (However as the attacker has to be in the middle of the conversation to exploit this flaw they could perform a similar denial attack without exploiting this issue). CVSS2 score of low, 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N) This issue only affected Red Hat Enterprise Linux 5, and not the package update mechanism as shipped with Red Hat Enterprise Linux 2.1, 3, and 4. Lifting embargo This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2008-0815.html |