First published: Mon Jan 24 2011(Updated: )
A session fixation flaw was found in the way Red Hat Network (RHN) Satellite and Spacewalk services handled session cookies. An RHN Satellite or Spacewalk Server user able to pre-set the session cookie in a victim's browser to a valid value could use this flaw to hijack the victim's session after the next log in. References: [1] <a href="http://en.wikipedia.org/wiki/Session_fixation">http://en.wikipedia.org/wiki/Session_fixation</a> [2] <a href="http://shiflett.org/articles/session-fixation">http://shiflett.org/articles/session-fixation</a> Acknowledgements: Red Hat would like to thank Thomas Biege of the SuSE Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | ||
Spacewalk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-672159 is classified as high due to the potential for session hijacking.
To fix REDHAT-BUG-672159, users should update their Red Hat Network Satellite or Spacewalk software to the latest version that includes the patch.
Users of Red Hat Network Satellite and Spacewalk services are affected by REDHAT-BUG-672159.
REDHAT-BUG-672159 is a session fixation vulnerability that allows attackers to hijack user sessions.
Yes, REDHAT-BUG-672159 can be exploited remotely if an attacker can pre-set the session cookie in a victim's browser.