First published: Thu Jun 24 2010(Updated: )
An improper input sanitization flaw was found in the way Red Hat Network Satellite performed management of monitoring probes. A remote, authenticated attacker, with the privilege to administer monitoring probes, could execute arbitrary code with the privileges of the user, the Red Hat Network Satellite monitoring service is running under, by providing a specially-crafted values for certain options of the monitoring probe display. References: For further information about Red Hat Network Satellite monitoring entitlements and management of monitoring probes, please refer to the reference guide of your Red Hat Network Satellite installation.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-607712 is considered high due to the potential for remote code execution by an authenticated user.
To fix REDHAT-BUG-607712, you need to apply the latest security patches provided by Red Hat for the Network Satellite software.
Exploiting REDHAT-BUG-607712 allows an attacker to execute arbitrary code with the privileges of the user managing monitoring probes.
REDHAT-BUG-607712 affects users of the Red Hat Network Satellite who have privileges to administer monitoring probes.
REDHAT-BUG-607712 was reported in Bugzilla as a vulnerability concerning improper input sanitization in Red Hat Network Satellite.