The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/55208 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/08/24/6 | mailing list |
http://www.openwall.com/lists/oss-security/2012/08/26/1 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=851672 | |
http://secunia.com/advisories/50409 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77984 | vdb entry |
http://gerrit.ovirt.org/#/c/7209/ | |
http://gerrit.ovirt.org/#/c/7249/ |