Vulnerability Name:

CVE-2008-4313 (CCN-46829)

Assigned:2008-08-14
Published:2008-08-14
Updated:2017-09-29
Summary:A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which allows remote authenticated users to bypass intended access restrictions and send requests to OpenPegasus WBEM services.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
4.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2008-4313

Source: OSVDB
Type: UNKNOWN
50277

Source: CCN
Type: RHSA-2008-1001
tog-pegasus security update

Source: CCN
Type: SA32862
Red Hat update for tog-pegasus

Source: SECUNIA
Type: Vendor Advisory
32862

Source: CCN
Type: SECTRACK ID: 1021283
OpenPegasus 'access.conf' Security Settings Can Be Bypassed

Source: CCN
Type: OpenPegasus Web site
OpenPegasus

Source: CCN
Type: OSVDB ID: 50277
OpenPegasus WBEM Services (tog-pegasus) on Red Hat Linux Access Control Reversion Weakness

Source: REDHAT
Type: UNKNOWN
RHSA-2008:1001

Source: BID
Type: UNKNOWN
32460

Source: CCN
Type: BID-32460
'tog-pegasus' Package for Red Hat Enterprise Linux Security Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1021283

Source: CONFIRM
Type: UNKNOWN
https://admin.fedoraproject.org/updates/tog-pegasus-2.7.0-7.fc9

Source: CONFIRM
Type: Patch
https://admin.fedoraproject.org/updates/tog-pegasus-2.7.1-3.fc10

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=459217

Source: XF
Type: UNKNOWN
togpegasus-wbem-security-bypass(46829)

Source: XF
Type: UNKNOWN
togpegasus-wbem-security-bypass(46829)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9556

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
  • AND
  • cpe:/a:openpegasus:openpegasus_wbem:2.7.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:29308
    P
    RHSA-2008:1001 -- tog-pegasus security update (Important)
    2015-08-17
    oval:org.mitre.oval:def:22186
    P
    ELSA-2008:1001: tog-pegasus security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:9556
    V
    A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which allows remote authenticated users to bypass intended access restrictions and send requests to OpenPegasus WBEM services.
    2013-04-29
    oval:com.redhat.rhsa:def:20081001
    P
    RHSA-2008:1001: tog-pegasus security update (Important)
    2008-11-25
    BACK
    redhat enterprise linux 5.0
    redhat enterprise linux desktop 5.0
    openpegasus openpegasus wbem 2.7.0