First published: Mon Jan 24 2011(Updated: )
A session fixation flaw was found in the way Red Hat Network (RHN) Satellite and Spacewalk services handled session cookies. An RHN Satellite or Spacewalk Server user able to pre-set the session cookie in a victim's browser to a valid value could use this flaw to hijack the victim's session after the next log in. References: [1] <a href="http://en.wikipedia.org/wiki/Session_fixation">http://en.wikipedia.org/wiki/Session_fixation</a> [2] <a href="http://shiflett.org/articles/session-fixation">http://shiflett.org/articles/session-fixation</a> Acknowledgements: Red Hat would like to thank Thomas Biege of the SuSE Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Network Satellite Server | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.