First published: Wed Feb 05 2014(Updated: )
Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Network Proxy | =5.4 | |
Red Hat Satellite | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0059 is classified as a moderate severity vulnerability due to the exposure of cleartext passwords.
To fix CVE-2012-0059, update your Red Hat Network Satellite or Proxy to the latest patched version provided by Red Hat.
CVE-2012-0059 affects Red Hat Network Satellite and Proxy version 5.4.
Yes, CVE-2012-0059 can lead to unauthorized access as it exposes user passwords in error messages.
The risks associated with CVE-2012-0059 include potential account compromise and unauthorized administrative actions.