Bug 875294 (CVE-2012-5509) - CVE-2012-5509 aeolus-configserver: aeolus-configserver-setup /tmp file conductor credentials leak
Summary: CVE-2012-5509 aeolus-configserver: aeolus-configserver-setup /tmp file conduc...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5509
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 875222 891393
Blocks: 883745 906635
TreeView+ depends on / blocked
 
Reported: 2012-11-10 07:39 UTC by Kurt Seifried
Modified: 2019-09-29 12:57 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-03-15 03:55:23 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0545 normal SHIPPED_LIVE Moderate: CloudForms Cloud Engine 1.1.2 update 2013-02-22 00:01:30 UTC

Description Kurt Seifried 2012-11-10 07:39:35 UTC
Aaron Weitekamp of Red Hat reports:

Description of problem:
aeolus-configserver-setup leaves /tmp file that contains key/secret credentials. File is chmod 755.

Version-Release number of selected component (if applicable):
1.1
[root@10-16-120-239 ~]# rpm -qa |grep aeolus
aeolus-audrey-agent-0.4.10-1.el6cf.noarch
aeolus-configserver-0.4.11-1.el6cf.noarch

How reproducible:
always

Steps to Reproduce:
1. run `aeolus-configserver-setup`
2. search for file in /tmp `ls -ltr /tmp`

Actual results:
file /tmp/tmp.[random_string] exists with credentials

Expected results:
remove /tmp file.

Comment 2 Murray McAllister 2013-02-13 23:36:32 UTC
Acknowledgements:

This issue was discovered by Aaron Weitekamp of the Red Hat Cloud Quality Engineering team.

Comment 3 errata-xmlrpc 2013-02-21 19:08:16 UTC
This issue has been addressed in following products:

  CloudForms for RHEL 6

Via RHSA-2013:0545 https://rhn.redhat.com/errata/RHSA-2013-0545.html


Note You need to log in before you can comment on or make changes to this bug.