First published: Wed May 11 2016(Updated: )
It was reported that engine-setup logs for RHEV-M contained enough information for extraction of admin password for RHEV-M. Specifically, it contains output of each SQL query with encrypted admin password from the database, and the result of esch external command execution including the openssl command that extracts the private key from the p12 bundle. Having both, encrypted password and private key in the same file gives ability for everyone, who is able to read log file, to obtain admin password. This issue was introduced with following commit: <a href="https://gerrit.ovirt.org/#/c/43578">https://gerrit.ovirt.org/#/c/43578</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | =3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4443 is rated as a medium severity vulnerability due to the potential exposure of sensitive admin password information.
To fix CVE-2016-4443, update to the latest patched version of Red Hat Enterprise Virtualization that addresses this vulnerability.
CVE-2016-4443 can allow an attacker to extract the admin password from the engine-setup logs of RHEV-M.
CVE-2016-4443 specifically affects Red Hat Enterprise Virtualization version 3.6.
There are no documented workarounds for CVE-2016-4443, so it is recommended to apply the patch as soon as it is available.