[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2013:1121-01 -- Redhat sos

ID: oval:org.secpod.oval:def:501085Date: (C)2013-09-26   (M)2023-12-07
Class: PATCHFamily: unix




The sos package contains a set of tools that gather information from system hardware, logs and configuration files. The information can then be used for diagnostic purposes and debugging. The sosreport utility collected the Kickstart configuration file , but did not remove the root user"s password from it before adding the file to the resulting archive of debugging information. An attacker able to access the archive could possibly use this flaw to obtain the root user"s password. "/root/anaconda-ks.cfg" usually only contains a hash of the password, not the plain text password. Note: This issue affected all installations, not only systems installed via Kickstart. A "/root/anaconda-ks.cfg" file is created by all installation types. The utility also collects yum repository information from "/etc/yum.repos.d" which in uncommon configurations may contain passwords. Any http_proxy password specified in these files will now be automatically removed. Passwords embedded within URLs in these files should be manually removed or the files excluded from the archive. All users of sos are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Platform:
Red Hat Enterprise Linux 5
Product:
sos
Reference:
RHSA-2013:1121-01
CVE-2012-2664
CVE    1
CVE-2012-2664
CPE    2
cpe:/o:redhat:enterprise_linux:5
cpe:/a:sos:sos

© SecPod Technologies