Bug 875294 - (CVE-2012-5509) CVE-2012-5509 aeolus-configserver: aeolus-configserver-setup /tmp file conductor credentials leak
CVE-2012-5509 aeolus-configserver: aeolus-configserver-setup /tmp file conduc...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20130221,reported=2...
: Security
Depends On: 875222 891393
Blocks: 883745 906635
  Show dependency treegraph
 
Reported: 2012-11-10 02:39 EST by Kurt Seifried
Modified: 2014-09-08 02:54 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-03-14 23:55:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Kurt Seifried 2012-11-10 02:39:35 EST
Aaron Weitekamp of Red Hat reports:

Description of problem:
aeolus-configserver-setup leaves /tmp file that contains key/secret credentials. File is chmod 755.

Version-Release number of selected component (if applicable):
1.1
[root@10-16-120-239 ~]# rpm -qa |grep aeolus
aeolus-audrey-agent-0.4.10-1.el6cf.noarch
aeolus-configserver-0.4.11-1.el6cf.noarch

How reproducible:
always

Steps to Reproduce:
1. run `aeolus-configserver-setup`
2. search for file in /tmp `ls -ltr /tmp`

Actual results:
file /tmp/tmp.[random_string] exists with credentials

Expected results:
remove /tmp file.
Comment 2 Murray McAllister 2013-02-13 18:36:32 EST
Acknowledgements:

This issue was discovered by Aaron Weitekamp of the Red Hat Cloud Quality Engineering team.
Comment 3 errata-xmlrpc 2013-02-21 14:08:16 EST
This issue has been addressed in following products:

  CloudForms for RHEL 6

Via RHSA-2013:0545 https://rhn.redhat.com/errata/RHSA-2013-0545.html

Note You need to log in before you can comment on or make changes to this bug.