First published: Fri May 25 2012(Updated: )
It was discovered that Red Hat Network Configuration Client set insecure (0644) permissions on the /var/log/rhncfg-actions file used to store (besides terminal) the output of different RHN Client actions (diff, verify etc.). A local attacker could use this flaw to obtain sensitive information, if the rhncfg-client diff action has been used to query differences between the (normally for unprivileged user not readable) config files stored by RHN and those, deployed on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Rhncfg | <=5.10.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2679 is classified as a moderate severity vulnerability due to the potential for local attackers to access sensitive information.
To fix CVE-2012-2679, update the Red Hat Network Configuration Client to a version that restricts permissions on the /var/log/rhncfg-actions file.
CVE-2012-2679 affects users of Red Hat Network Configuration Client versions up to and including 5.10.27.
CVE-2012-2679 is a local information disclosure vulnerability resulting from improper file permissions.
No, CVE-2012-2679 can only be exploited by local attackers with access to the system.