Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
References
Link | Resource |
---|---|
http://www.redhat.com/support/errata/RHSA-2011-0434.html | Not Applicable |
https://bugzilla.redhat.com/show_bug.cgi?id=584118 | Issue Tracking Vendor Advisory |
http://www.securitytracker.com/id?1025316 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/44150 | Not Applicable |
http://www.securityfocus.com/bid/47316 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2011/0967 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66690 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2011-04-18 10:55
Updated : 2022-02-18 20:12
NVD link : CVE-2010-1171
Mitre link : CVE-2010-1171
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
redhat
- satellite