First published: Fri Dec 07 2012(Updated: )
A security flaw was found in the way rhn-migrate-classic-to-rhsm tool of subscription-manager, a suite of tools and libraries for subscription and repository management, performed migration of system profiles, registered with Red Hat Network Classic to Customer Portal Subscription Management (certificate of Red Hat Network Classic server was not verified for validity). A rogue server could use this flaw to conduct man-in-the-middle (MiTM) attacks, possibly leading to their ability to obtain user credentials, that would be used for authentication of that particular user at Red Hat Network Classic server before the system profile(s) migration. This issue was found by Florian Weimer of Red Hat Product Security Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.9.z | |
Red Hat Enterprise Linux HPC Node | =6 | |
Red Hat Enterprise Linux | =5.9 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server eus | =6.4.z | |
redhat enterprise Linux workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6137 is rated as a moderate severity vulnerability.
To fix CVE-2012-6137, ensure you apply the latest updates provided by Red Hat for affected versions.
CVE-2012-6137 affects various versions of Red Hat Enterprise Linux, including 5 and 6 series.
CVE-2012-6137 is a security flaw in the rhn-migrate-classic-to-rhsm tool used for system profile migrations.
Currently, there are no specific workarounds for CVE-2012-6137 other than upgrading to patched versions.