Two vulnerabilities in Red Hat CloudForms



Published: 2017-06-01
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2016-4457
CVE-2017-2639
CWE-ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
CloudForms
Client/Desktop applications / Multimedia software

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Man-in-the-middle attack

EUVDB-ID: #VU6853

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4457

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to conduct a MitM attack.

The weakness exists due to use of a default SSL/TLS certificate for the web server during installation. A remote attacker can perform man-in-the-middle attack while installing the new certificate and obtain a copy of the new private key.

Successful exploitation of this vulnerability will allow an attacker to gain access to potentially sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

CloudForms: 5.8

External links

http://access.redhat.com/errata/RHSA-2017:1367


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Spoofing attack

EUVDB-ID: #VU6854

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2639

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The weakness exists due to improper verification that the server hostname matches the domain name in the certificate. A remote attacker can use a certificate authority, spoof a Red Hat Virtualization (RHEV) or OpenShift system and gain access to arbitrary files.

Successful exploitation of this vulnerability results in information disclosure.

Mitigation

Install update from vendor's website.

Vulnerable software versions

CloudForms: 5.8

External links

http://access.redhat.com/errata/RHSA-2017:1367


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###