First published: Fri Sep 03 2010(Updated: )
WebYaST in yast2-webclient in SUSE Linux Enterprise (SLE) 11 on the WebYaST appliance uses a fixed secret key that is embedded in the appliance's image, which allows remote attackers to spoof session cookies by leveraging knowledge of this key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11 | |
Novell WebYaST Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1507 is considered a critical vulnerability as it allows remote attackers to spoof session cookies due to a fixed secret key.
To fix CVE-2010-1507, upgrade to a patched version of the SUSE Linux Enterprise or WebYaST Appliance that addresses this vulnerability.
CVE-2010-1507 affects SUSE Linux Enterprise 11 and the Novell WebYaST Appliance.
Yes, CVE-2010-1507 can be exploited remotely, enabling attackers to spoof session cookies without physical access to the system.
The impact of CVE-2010-1507 is that it compromises the integrity of user sessions, allowing unauthorized access to user accounts.