Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1107853 - (CVE-2014-3489) CVE-2014-3489 CFME: Default salt value in miq-password.rb
CVE-2014-3489 CFME: Default salt value in miq-password.rb
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20140630,reported=2...
: Security
Depends On: 1107856 1107857
Blocks: 1086525 1107854
  Show dependency treegraph
 
Reported: 2014-06-10 15:30 EDT by Kurt Seifried
Modified: 2014-11-21 05:30 EST (History)
15 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-06-30 19:23:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0816 normal SHIPPED_LIVE Important: cfme security, bug fix, and enhancement update 2014-06-30 18:59:47 EDT

  None (edit)
Description Kurt Seifried 2014-06-10 15:30:52 EDT
It is reported that cfme contains a default salt value:

lib/util/miq-password.rb

     def initialize(str=nil, enc_alg=nil, key=nil, iv=nil)
        @enc_alg = enc_alg || @@enc_alg || "AES-128-CBC"
        @key     = key     || @@key     || "1234567890123456"
        @iv      = iv      || @@iv      || "6543210987654321"
        @encStr  = nil

This negates the value of having a salt function with respect to password storage.
Comment 3 errata-xmlrpc 2014-06-30 15:03:34 EDT
This issue has been addressed in following products:

  CloudForms Management Engine 5.x

Via RHSA-2014:0816 https://rhn.redhat.com/errata/RHSA-2014-0816.html

Note You need to log in before you can comment on or make changes to this bug.