First published: Tue Nov 18 2008(Updated: )
A security flaw was found in the OpenPegasus WBEM service, shipped as tog-pegasus package within the Red Hat Enterprise Linux. It was discovered, the OpenPegasus service did not log failed authentication attempts to the system log file via the traditional Pluggable Authentication Modules mechanism. An attacker could use this flaw to discover the password of the root account used for the authentication against the CIM server.
Affected Software | Affected Version | How to fix |
---|---|---|
Tog-pegasus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-472017 is categorized as a medium risk due to the lack of logging for failed authentication attempts.
To fix REDHAT-BUG-472017, you should update the tog-pegasus package to the latest version provided by Red Hat.
REDHAT-BUG-472017 is a security vulnerability related to improper logging of failed authentication attempts.
The systems affected by REDHAT-BUG-472017 include Red Hat Enterprise Linux installations that utilize the tog-pegasus package.
As a temporary workaround for REDHAT-BUG-472017, consider implementing external monitoring solutions to track failed authentication attempts.