Vulnerability Name:

CVE-2008-4315 (CCN-46830)

Assigned:2008-08-14
Published:2008-08-14
Updated:2017-09-29
Summary:tog-pegasus in OpenGroup Pegasus 2.7.0 on Red Hat Enterprise Linux (RHEL) 5, Fedora 9, and Fedora 10 does not log failed authentication attempts to the OpenPegasus CIM server, which makes it easier for remote attackers to avoid detection of password guessing attacks.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2008-4315

Source: OSVDB
Type: UNKNOWN
50278

Source: CCN
Type: RHSA-2008-1001
tog-pegasus security update

Source: CCN
Type: SA32862
Red Hat update for tog-pegasus

Source: SECUNIA
Type: Vendor Advisory
32862

Source: CCN
Type: SECTRACK ID: 1021281
OpenPegasus Does Not Log Failed Authentication Attempts

Source: CCN
Type: OpenPegasus Web site
OpenPegasus

Source: CCN
Type: OSVDB ID: 50278
OpenPegasus CIM server (tog-pegasus) on Red Hat Linux Failed Authentication Logging Weakness

Source: REDHAT
Type: UNKNOWN
RHSA-2008:1001

Source: SECTRACK
Type: UNKNOWN
1021281

Source: CONFIRM
Type: UNKNOWN
https://admin.fedoraproject.org/updates/tog-pegasus-2.7.0-7.fc9

Source: CONFIRM
Type: UNKNOWN
https://admin.fedoraproject.org/updates/tog-pegasus-2.7.1-3.fc10

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=472017

Source: XF
Type: UNKNOWN
togpegasus-systemlog-weak-security(46830)

Source: XF
Type: UNKNOWN
togpegasus-systemlog-weak-security(46830)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9431

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
  • AND
  • cpe:/a:openpegasus:openpegasus_wbem:2.7.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:29308
    P
    RHSA-2008:1001 -- tog-pegasus security update (Important)
    2015-08-17
    oval:org.mitre.oval:def:22186
    P
    ELSA-2008:1001: tog-pegasus security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:9431
    V
    tog-pegasus in OpenGroup Pegasus 2.7.0 on Red Hat Enterprise Linux (RHEL) 5, Fedora 9, and Fedora 10 does not log failed authentication attempts to the OpenPegasus CIM server, which makes it easier for remote attackers to avoid detection of password guessing attacks.
    2013-04-29
    oval:com.redhat.rhsa:def:20081001
    P
    RHSA-2008:1001: tog-pegasus security update (Important)
    2008-11-25
    BACK
    redhat enterprise linux 5.0
    redhat enterprise linux desktop 5.0
    openpegasus openpegasus wbem 2.7.0