First published: Tue Jul 29 2008(Updated: )
It was discovered that yum-rhn-plugin does not always properly verify SSL certificate against configured trusted CA certificate when communicating with Red Hat Network (RHN) server. SSL certificate was properly verified for XML-RPC communication, but the check was not applied to the file downloads. This can possibly simplify man-in-the-middle attacks, allowing attacker to provide users with crafted repository meta-data files or RPM packages. However, GPG signatures are applied before installing any package, so an attacker could not use this to trick user to install packages from an untrusted source.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3270 has a medium severity rating due to the risk of man-in-the-middle attacks when SSL certificates are not properly verified.
To fix CVE-2008-3270, ensure you update your yum-rhn-plugin to the latest version that includes proper SSL certificate verification.
CVE-2008-3270 affects Red Hat Enterprise Linux 5.0 specifically.
CVE-2008-3270 can result in man-in-the-middle attacks due to inadequate SSL certificate verification during file downloads.
CVE-2008-3270 is less of a concern for current systems if they have been updated, but older versions may still be vulnerable.