First published: Tue Nov 18 2008(Updated: )
A security flaw was found in the OpenPegasus WBEM service, shipped as tog-pegasus package within the Red Hat Enterprise Linux. It was discovered, the OpenPegasus service did not log failed authentication attempts to the system log file via the traditional Pluggable Authentication Modules mechanism. An attacker could use this flaw to discover the password of the root account used for the authentication against the CIM server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
OpenPegasus | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4315 has been classified as a moderate severity vulnerability due to the potential for unauthorized access without proper log recording of failed authentication attempts.
To remediate CVE-2008-4315, update the affected OpenPegasus service to the patched version provided in recent Red Hat updates.
CVE-2008-4315 affects Red Hat Enterprise Linux 5.0 and Red Hat Enterprise Linux Desktop 5.0.
CVE-2008-4315 may be exploited remotely due to its association with a service that does not properly log authentication failures.
Systems running Red Hat Enterprise Linux 5.0 with the OpenPegasus WBEM service installed are impacted by CVE-2008-4315.