First published: Tue Dec 10 2013(Updated: )
SUSE Lifecycle Management Server (SLMS) before 1.3.7 does not generate a new secret key when the service starts, which allows remote attackers to defeat intended cryptographic protection mechanisms by leveraging knowledge of this key from a product installation elsewhere.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Lifecycle Management Server | <=1.3 | |
SUSE Lifecycle Management Server | =1.0 | |
SUSE Lifecycle Management Server | =1.1 | |
SUSE Lifecycle Management Server | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3710 has a medium severity rating due to the potential for remote attackers to exploit the lack of a newly generated secret key.
To fix CVE-2013-3710, upgrade to SUSE Lifecycle Management Server version 1.3.7 or later.
CVE-2013-3710 affects versions 1.0, 1.1, 1.2, and all versions before 1.3.7 of SUSE Lifecycle Management Server.
CVE-2013-3710 exposes the service to potential cryptographic protection failures due to not generating a new secret key at startup.
Organizations using vulnerable versions of SUSE Lifecycle Management Server are at risk of having their cryptographic protections compromised.