First published: Sat Dec 22 2007(Updated: )
Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tog-pegasus | <2:2.5.1-5.el4_6.1 | 2:2.5.1-5.el4_6.1 |
redhat/tog-pegasus | <2:2.5.1-2.el4_5.1 | 2:2.5.1-2.el4_5.1 |
redhat/tog-pegasus | <2:2.6.1-2.el5_1.1 | 2:2.6.1-2.el5_1.1 |
redhat/2.6.0 | <3. | 3. |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.5.z | |
Red Hat Enterprise Linux | =4.5.z | |
Redhat Enterprise Linux Desktop | =4.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
OpenPegasus Management server | =2.6.1 |
The tog-pegasus package is not installed by default on Red Hat Enterprise Linux. tog-pegasus supplied by Red Hat binds only to one port (as plain http is disabled), port 5989. The default firewall installed by Red Hat Enterprise Linux will block remote access to this port. In normal use it's unlikely you'd want to have this port accessible outside of an intranet anyway, and it's likely to be blocked by enterprise border firewalls. However if tog-pegasus has been installed and unblocked through the fireware, the Red Hat Security Response Team believes that it would still be hard to remotely exploit this issue to execute arbitrary code due to the default SELinux targeted policy on Enterprise Linux 4 and 5, and the SELinux memory protections enabled by default on Enterprise Linux 5.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0003 has been assigned a high severity rating due to the potential for remote code execution.
To mitigate CVE-2008-0003, upgrade to the patched versions of the tog-pegasus package as recommended by your vendor.
CVE-2008-0003 affects the tog-pegasus package on certain versions of Red Hat Enterprise Linux.
Yes, CVE-2008-0003 may allow remote attackers to gain unauthorized access through a buffer overflow vulnerability.
CVE-2008-0003 impacts specific versions of Red Hat Enterprise Linux and OpenPegasus Management server when they are configured improperly.