First published: Fri Mar 20 2009(Updated: )
A flaw was found in the way RHN Satellite rewrote certain URLs. An unauthenticated user could use a specially-crafted HTTP request to obtain sensitive information about the host system RHN Satellite was running on. They could also use RHN Satellite as a distributed denial of service tool, forcing it to connect to an arbitrary service at an arbitrary IP address via a specially-crafted HTTP request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | =5.3 | |
Red Hat Satellite | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0788 has been rated as a moderate severity vulnerability.
To fix CVE-2009-0788, upgrade to Red Hat Network Satellite Server version 5.5 or later.
CVE-2009-0788 can allow an unauthenticated user to access sensitive information and potentially use the server for distributed denial of service attacks.
CVE-2009-0788 affects Red Hat Network Satellite Server versions 5.3 and 5.4.
Yes, CVE-2009-0788 can be exploited remotely via a specially-crafted HTTP request.