First published: Wed Aug 17 2011(Updated: )
A flaw was discovered in cumin where it would log broker authentication credentials to the cumin log file. A local user exploiting this flaw could connect to the broker outside of cumin's control and perform certain operations such as scheduling jobs, setting attributes on jobs, as well as holding, releasing or removing jobs. The user could also use this to, depending on the defined ACLs of the broker, manipulate message queues and other privileged operations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise MRG | =2.0 | |
Red Hat Enterprise MRG | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2925 has a medium severity level due to the exposure of sensitive broker authentication credentials.
To fix CVE-2011-2925, update to the latest patched version of Red Hat Enterprise MRG that addresses this vulnerability.
CVE-2011-2925 affects users running Red Hat Enterprise MRG version 2.0.
CVE-2011-2925 allows local users to exploit broker authentication credentials to perform unauthorized operations.
As an immediate workaround for CVE-2011-2925, limit access to the cumin log files to prevent unauthorized reading of broker credentials.