First published: Sat Dec 22 2007(Updated: )
Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tog-pegasus | <2:2.5.1-5.el4_6.1 | 2:2.5.1-5.el4_6.1 |
redhat/tog-pegasus | <2:2.5.1-2.el4_5.1 | 2:2.5.1-2.el4_5.1 |
redhat/tog-pegasus | <2:2.6.1-2.el5_1.1 | 2:2.6.1-2.el5_1.1 |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.5.z | |
Redhat Enterprise Linux | =4.5.z | |
Redhat Enterprise Linux Desktop | =4.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
OpenPegasus Management server | =2.6.1 |
The tog-pegasus package is not installed by default on Red Hat Enterprise Linux. tog-pegasus supplied by Red Hat binds only to one port (as plain http is disabled), port 5989. The default firewall installed by Red Hat Enterprise Linux will block remote access to this port. In normal use it's unlikely you'd want to have this port accessible outside of an intranet anyway, and it's likely to be blocked by enterprise border firewalls. However if tog-pegasus has been installed and unblocked through the fireware, the Red Hat Security Response Team believes that it would still be hard to remotely exploit this issue to execute arbitrary code due to the default SELinux targeted policy on Enterprise Linux 4 and 5, and the SELinux memory protections enabled by default on Enterprise Linux 5.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.