Bug 672159 (CVE-2011-0717) - CVE-2011-0717 Satellite, Spacewalk: Session fixation flaw
Summary: CVE-2011-0717 Satellite, Spacewalk: Session fixation flaw
Status: CLOSED ERRATA
Alias: CVE-2011-0717
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact: Jiri Kastner
URL:
Whiteboard: public=20110223,reported=20110117,sou...
Keywords: Security
Depends On: 678283 679887
Blocks: 622406
TreeView+ depends on / blocked
 
Reported: 2011-01-24 09:24 UTC by Jan Lieskovsky
Modified: 2016-03-04 10:42 UTC (History)
7 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2013-08-02 15:44:10 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0300 normal SHIPPED_LIVE Moderate: Red Hat Network Satellite Server security update 2011-02-23 19:01:26 UTC

Description Jan Lieskovsky 2011-01-24 09:24:48 UTC
A session fixation flaw was found in the way Red Hat
Network (RHN) Satellite and Spacewalk services handled
session cookies. An RHN Satellite or Spacewalk Server
user able to pre-set the session cookie in a victim's
browser to a valid value could use this flaw to hijack
the victim's session after the next log in.

References:
[1] http://en.wikipedia.org/wiki/Session_fixation
[2] http://shiflett.org/articles/session-fixation

Acknowledgements:

Red Hat would like to thank Thomas Biege of the SuSE Security Team
for reporting this issue.

Comment 8 Jan Lieskovsky 2011-02-17 12:35:21 UTC
The CVE identifier of CVE-2011-0717 has been assigned to this issue.

Comment 20 errata-xmlrpc 2011-02-23 19:01:33 UTC
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.4

Via RHSA-2011:0300 https://rhn.redhat.com/errata/RHSA-2011-0300.html

Comment 21 Jan Lieskovsky 2011-02-23 19:07:57 UTC
Created spacewalk-backend tracking bugs for this issue

Affects: fedora-all [bug 679887]


Note You need to log in before you can comment on or make changes to this bug.