First published: Mon Sep 08 2014(Updated: )
Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt | <=3.4.0 | |
Red Hat oVirt Engine | =3.0.0 | |
Red Hat oVirt Engine | =3.1.0 | |
Red Hat oVirt Engine | =3.2.0 | |
Red Hat oVirt Engine | =3.3.0 | |
Red Hat oVirt Engine | =3.3.2-rc1 | |
Red Hat oVirt Engine | =3.3.3 | |
Red Hat oVirt Engine | =3.3.4 | |
Red Hat oVirt Engine | =3.3.5 | |
Red Hat oVirt Engine | =3.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0152 has a medium severity level due to its session fixation vulnerability in the web admin interface.
To fix CVE-2014-0152, upgrade to oVirt version 3.4.1 or later, which addresses the vulnerability.
CVE-2014-0152 affects oVirt versions 3.4.0 and earlier, as well as Red Hat oVirt Engine versions 3.0.0 to 3.4.0-rc1.
CVE-2014-0152 facilitates session hijacking attacks, allowing remote attackers to take over web sessions.
A potential workaround for CVE-2014-0152 includes implementing additional session management controls to mitigate the risks.