Bug 528890 (CVE-2009-3552)

Summary: CVE-2009-3552 RHEV-M VDC - GUI: Man in the middle attack possible on the GUI to Backend SSL connection
Product: [Other] Security Response Reporter: Yaniv Kaul <ykaul>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bsettle, jlieskov, mjc, mkenneth, pmatouse, security-response-team, srevivo
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Windows   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
We'll need release notes on how to 'upgrade' from a 2.2.0 without HTTPS to 2.2.2 with HTTPS. 1. We should update the documentation (not release notes) that the default should now be https://... - with additional instructions on installing the RHEVM CA certificate. 2. If you've already used HTTP, you will need to erase the cookie(s) (called RHEVManager/) from IE (and restart IE). The next time you'll go to https://<rhevm>/RHEVManager, you'll get the additional prompt to install the RHEVM CA certificate. Once you've done that, after you restart IE (again) and go to https://<rhevm>/RHEVManager, everybody will be happy.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-19 09:08:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 532034    
Bug Blocks:    

Comment 8 Petr Matousek 2010-08-19 21:34:33 UTC
It was found that the SSL certificate was not verified when using the 
client-side Red Hat Enterprise Virtualization Manager interface (a Windows 
Presentation Foundation (WPF) XAML browser application) to connect to the Red 
Hat Enterprise Virtualization Manager. An attacker on the local network could 
use this flaw to conduct a man-in-the-middle attack, tricking the user into 
thinking they are viewing the Red Hat Enterprise Virtualization Manager when the 
content is actually attacker-controlled, or modifying actions a user requested 
Red Hat Enterprise Virtualization Manager to perform.

Comment 9 errata-xmlrpc 2010-08-19 21:38:25 UTC
This issue has been addressed in following products:



Via RHSA-2010:0613 https://rhn.redhat.com/errata/RHSA-2010-0613.html