Secunia Security Advisory - Red Hat has issued an update for Red Hat Network Satellite Server. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, and malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, and cause a DoS (Denial of Service).
b64c8441dd4eba3c635c7f198a80a366557a0611463ca68039525ffe8771d6a0
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
Red Hat update for Red Hat Network Satellite Server
SECUNIA ADVISORY ID:
SA31493
VERIFY ADVISORY:
http://secunia.com/advisories/31493/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, DoS
WHERE:
>From remote
SOFTWARE:
Red Hat Network Satellite Server 5.x
http://secunia.com/product/15567/
DESCRIPTION:
Red Hat has issued an update for Red Hat Network Satellite Server.
This fixes some vulnerabilities, which can be exploited by malicious
users to disclose potentially sensitive information, and malicious
people to bypass certain security restrictions, disclose sensitive
information, conduct cross-site scripting attacks, and cause a DoS
(Denial of Service).
For more information:
SA18485
SA18755
SA24678
SA25721
SA27398
SA27959
1) A vulnerability is caused due to the manzier.pxt XML-RPC script
using a hard-coded authentication token. This can be exploited to
disclose certain information (e.g. login names, email addresses, user
IDs, and information about entitlements).
SOLUTION:
Update to Red Hat Network Satellite Server version 5.1.1. Updated
packages are available via the Red Hat Network.
http://rhn.redhat.com
PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
ORIGINAL ADVISORY:
https://rhn.redhat.com/errata/RHSA-2008-0630.html
OTHER REFERENCES:
SA18485:
http://secunia.com/advisories/18485/
SA18755:
http://secunia.com/advisories/18755/
SA24678:
http://secunia.com/advisories/24678/
SA25721:
http://secunia.com/advisories/25721/
SA27398:
http://secunia.com/advisories/27398/
SA27959:
http://secunia.com/advisories/27959/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------