LOW · 3.6

CVE-2010-1439

yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, whi...

Vulnerability Description

yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file.

CVSS Score

3.6

LOW

AV:L/AC:L/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
RedhatRhn-Client-ToolsAll versions
RedhatYum-Rhn-PluginAll versions
FedoraprojectFedoraAll versions
RedhatEnterprise Linux5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-1439?

CVE-2010-1439 is a vulnerability with a CVSS score of 3.6 (LOW). yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, whi...

How severe is CVE-2010-1439?

CVE-2010-1439 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-1439?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Rhn-Client-Tools, Redhat Yum-Rhn-Plugin, Fedoraproject Fedora, Redhat Enterprise Linux.