Описание
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-2925
- https://bugzilla.redhat.com/show_bug.cgi?id=731574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69659
- http://osvdb.org/75217
- http://secunia.com/advisories/45887
- http://secunia.com/advisories/45928
- http://www.redhat.com/support/errata/RHSA-2011-1249.html
- http://www.redhat.com/support/errata/RHSA-2011-1250.html
- http://www.securityfocus.com/bid/49500
- http://www.securitytracker.com/id?1026021
Связанные уязвимости
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.