Bug 528890 (CVE-2009-3552) - CVE-2009-3552 RHEV-M VDC - GUI: Man in the middle attack possible on the GUI to Backend SSL connection
Summary: CVE-2009-3552 RHEV-M VDC - GUI: Man in the middle attack possible on the GUI ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-3552
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Windows
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 532034
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-10-14 08:41 UTC by Yaniv Kaul
Modified: 2021-10-19 09:08 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
We'll need release notes on how to 'upgrade' from a 2.2.0 without HTTPS to 2.2.2 with HTTPS. 1. We should update the documentation (not release notes) that the default should now be https://... - with additional instructions on installing the RHEVM CA certificate. 2. If you've already used HTTP, you will need to erase the cookie(s) (called RHEVManager/) from IE (and restart IE). The next time you'll go to https://<rhevm>/RHEVManager, you'll get the additional prompt to install the RHEVM CA certificate. Once you've done that, after you restart IE (again) and go to https://<rhevm>/RHEVManager, everybody will be happy.
Clone Of:
Environment:
Last Closed: 2021-10-19 09:08:06 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0613 0 normal SHIPPED_LIVE Moderate: Red Hat Enterprise Virtualization Manager security update 2010-08-19 21:38:21 UTC

Comment 8 Petr Matousek 2010-08-19 21:34:33 UTC
It was found that the SSL certificate was not verified when using the 
client-side Red Hat Enterprise Virtualization Manager interface (a Windows 
Presentation Foundation (WPF) XAML browser application) to connect to the Red 
Hat Enterprise Virtualization Manager. An attacker on the local network could 
use this flaw to conduct a man-in-the-middle attack, tricking the user into 
thinking they are viewing the Red Hat Enterprise Virtualization Manager when the 
content is actually attacker-controlled, or modifying actions a user requested 
Red Hat Enterprise Virtualization Manager to perform.

Comment 9 errata-xmlrpc 2010-08-19 21:38:25 UTC
This issue has been addressed in following products:



Via RHSA-2010:0613 https://rhn.redhat.com/errata/RHSA-2010-0613.html


Note You need to log in before you can comment on or make changes to this bug.