Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/44150 | third party advisory not applicable |
http://www.redhat.com/support/errata/RHSA-2011-0434.html | not applicable vendor advisory |
http://www.securitytracker.com/id?1025316 | vdb entry third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66690 | vdb entry third party advisory |
http://www.securityfocus.com/bid/47316 | vdb entry third party advisory |
http://www.vupen.com/english/advisories/2011/0967 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=584118 | issue tracking vendor advisory |