Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-2679

Опубликовано: 14 июн. 2012
Источник: redhat
CVSS2: 6.2

Описание

Red Hat Network (RHN) Configuration Client (rhncfg-client) in rhncfg before 5.10.27-8 uses weak permissions (world-readable) for /var/log/rhncfg-actions, which allows local users to obtain sensitive information about the rhncfg-client actions by reading the file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 5.6ServerAffected
Red Hat Network Tools for RHEL 5rhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 5.3.LLrhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 5.6.ZrhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 6rhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 6.0.ZrhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 6.1.ZrhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 6.2.ZrhncfgFixedRHSA-2012:136915.10.2012
Red Hat Network Tools for RHEL 6.3.ZrhncfgFixedRHSA-2012:136915.10.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=825275rhncfg: Insecure permissions used for /var/log/rhncfg-actions file

6.2 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

Red Hat Network (RHN) Configuration Client (rhncfg-client) in rhncfg before 5.10.27-8 uses weak permissions (world-readable) for /var/log/rhncfg-actions, which allows local users to obtain sensitive information about the rhncfg-client actions by reading the file.

github
больше 3 лет назад

Red Hat Network (RHN) Configuration Client (rhncfg-client) in rhncfg before 5.10.27-8 uses weak permissions (world-readable) for /var/log/rhncfg-actions, which allows local users to obtain sensitive information about the rhncfg-client actions by reading the file.

6.2 Medium

CVSS2