First published: Mon May 12 2008(Updated: )
The rootpw plugin in rPath Appliance Platform Agent 2 and 3 does not re-validate requests from a browser with a valid administrator session, including requests to change the password, which makes it easier for physically proximate attackers to gain privileges and maintain control over the administrator account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rPath Appliance Platform Agent | =3 | |
rPath Appliance Platform Agent | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2139 has a medium severity rating due to the potential for unauthorized privilege escalation.
To fix CVE-2008-2139, ensure that the rootpw plugin is updated to a secure version that re-validates browser requests.
CVE-2008-2139 affects rPath Appliance Platform Agent versions 2 and 3.
CVE-2008-2139 exposes systems to physical proximity attacks that can exploit the lack of re-validation in admin requests.
Currently, the recommended approach is to implement the latest security updates since no specific workaround is available.