Описание
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-1171
- https://bugzilla.redhat.com/show_bug.cgi?id=584118
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66690
- http://secunia.com/advisories/44150
- http://www.redhat.com/support/errata/RHSA-2011-0434.html
- http://www.securityfocus.com/bid/47316
- http://www.securitytracker.com/id?1025316
- http://www.vupen.com/english/advisories/2011/0967
EPSS
CVE ID
Связанные уязвимости
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
EPSS