First published: Mon Jan 24 2011(Updated: )
A session fixation flaw was found in the way Red Hat Network (RHN) Satellite and Spacewalk services handled session cookies. An RHN Satellite or Spacewalk Server user able to pre-set the session cookie in a victim's browser to a valid value could use this flaw to hijack the victim's session after the next log in. References: [1] <a href="http://en.wikipedia.org/wiki/Session_fixation">http://en.wikipedia.org/wiki/Session_fixation</a> [2] <a href="http://shiflett.org/articles/session-fixation">http://shiflett.org/articles/session-fixation</a> Acknowledgements: Red Hat would like to thank Thomas Biege of the SuSE Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Network Satellite Server | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0717 is classified as a high severity vulnerability due to its potential for session hijacking.
To fix CVE-2011-0717, it is recommended to upgrade the Red Hat Network Satellite Server to a patched version provided by Red Hat.
CVE-2011-0717 specifically affects Red Hat Network Satellite Server version 5.4.
CVE-2011-0717 enables session fixation attacks that allow an attacker to hijack a user's session.
Yes, CVE-2011-0717 can be exploited remotely if an attacker can set the session cookie in the victim's browser.