Vulnerability Description
The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables the StrictHostKeyChecking option, which allows man-in-the-middle attackers to spoof kdump servers, and obtain sensitive core information, by using an arbitrary SSH key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Kexec-Tools | <= 1.102pre-126 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2011-1532.html
- http://rhn.redhat.com/errata/RHSA-2012-0152.html
- https://bugzilla.redhat.com/show_bug.cgi?id=716439Vendor Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1532.html
- http://rhn.redhat.com/errata/RHSA-2012-0152.html
- https://bugzilla.redhat.com/show_bug.cgi?id=716439Vendor Advisory
FAQ
What is CVE-2011-3588?
CVE-2011-3588 is a vulnerability with a CVSS score of 5.7 (MEDIUM). The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables ...
How severe is CVE-2011-3588?
CVE-2011-3588 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3588?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Kexec-Tools.