First published: Tue Apr 20 2010(Updated: )
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Network Satellite Server | =5.4 | |
Red Hat Network Satellite Server | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1171 is classified as a high severity vulnerability due to its potential for unauthorized file access and denial of service.
To fix CVE-2010-1171, you should upgrade your Red Hat Network Satellite to version 5.5 or later.
CVE-2010-1171 affects users of Red Hat Network Satellite versions 5.3 and 5.4.
The consequences of CVE-2010-1171 include unauthorized access to files and disrupted yum operations, leading to service denial.
Yes, CVE-2010-1171 can be exploited by remote authenticated users.