First published: Fri May 27 2016(Updated: )
/var/lib/rhsm/cache/entitlement_status.json and /var/lib/rhsm/facts/facts.json are world readable but contain sensitive information (Red Hat Contract number and hardware serial number, sufficient to authenticate again Red Hat and hardware vendor support) can could be used by an attacker to perform a social engineering attack. Upstream patch: <a href="https://github.com/candlepin/subscription-manager/commit/9dec31">https://github.com/candlepin/subscription-manager/commit/9dec31</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Red Hat Subscription Manager | <=1.17.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4455 is classified as a moderate severity vulnerability.
To fix CVE-2016-4455, ensure that the permissions on /var/lib/rhsm/cache/entitlement_status.json and /var/lib/rhsm/facts/facts.json are properly restricted.
CVE-2016-4455 exposes sensitive information such as the Red Hat Contract number and hardware serial number.
CVE-2016-4455 affects Red Hat Enterprise Linux versions 6.0 and 7.0, along with Red Hat Subscription Manager up to version 1.17.6-1.
Yes, an attacker could exploit CVE-2016-4455 to access sensitive information that may assist in unauthorized authentication.