Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.1832 Important: candlepin security update 20 December 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: candlepin Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 6 Linux variants Impact/Access: Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2013-6439 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2013-1863.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running candlepin check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: candlepin security update Advisory ID: RHSA-2013:1863-01 Product: Red Hat Subscription Asset Manager Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1863.html Issue date: 2013-12-19 CVE Names: CVE-2013-6439 ===================================================================== 1. Summary: Updated candlepin packages that fix one security issue are now available for Red Hat Subscription Asset Manager. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Subscription Asset Manager for RHEL 6 Server - noarch 3. Description: Candlepin is an open source entitlement management system. It tracks the products which an owner has subscribed too, and allows the owner to consume the subscriptions based on configurable business rules. It was discovered that, by default, Candlepin enabled a very weak authentication scheme if no setting was specified in the configuration file. (CVE-2013-6439) This issue was discovered by Adrian Likins of Red Hat. Note: The configuration file as supplied by Subscription Asset Manager 1.2 and 1.3 had this unsafe authentication mode disabled; however, users who have upgraded from Subscription Asset Manager 1.1 or earlier and who have not added "candlepin.auth.trusted.enable = false" to the Candlepin configuration will be affected by this issue. Users of Subscription Asset Manager 1.0 or 1.1 who cannot upgrade should add the following to "/etc/candlepin/candlepin.conf": candlepin.auth.trusted.enable = false candlepin.auth.trusted.enabled = false Users of Subscription Asset Manager 1.2 or 1.3 who cannot upgrade should only need to add: candlepin.auth.trusted.enable = false Installing this upgrade disables the unsafe authentication scheme unless it is specifically enabled in the configuration. Users of Red Hat Subscription Asset Manager are advised to upgrade to these updated packages, which correct this issue. Candlepin must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1042677 - CVE-2013-6439 candlepin: insecure authentication enabled by default 6. Package List: Red Hat Subscription Asset Manager for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/SAM/SRPMS/candlepin-0.8.26.0-1.el6sam.src.rpm noarch: candlepin-0.8.26.0-1.el6sam.noarch.rpm candlepin-selinux-0.8.26.0-1.el6sam.noarch.rpm candlepin-tomcat6-0.8.26.0-1.el6sam.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6439.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFSs4RhXlSAg2UNWIIRAqF2AKCaQwFNmSIEf6+gkXyk6Beu74jTugCfbHGt TscSeoIrp6meql4VQJ1nSRY= =L+8r - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUrOyNxLndAQH1ShLAQKXHA//ann5SJ4O/O6s3/Xm2T8CEsDLxk+Pzu+/ uEuBbV49hJjOgzN8osP4dKVKD3vQAxHduT8abIIcHm1zW+eE+j7jdo8aN68k+wFT BYi7lBaZS5d/7YkC1xYXK+GPCU1fQv8sMyuZOojmtdPXnbMG4Y9pY8IZTt9Lx7Sx PjiJMXxbeHjGK/GaKcQJjWWbuopQUlm/v4NtD91bV3MJcPvDzC7Wz5HJpR2OcnMh 974EI5t+GxXZ2iIPZIFAPfbiGioBoboiQ5UfMK0OL24GH0B0dFDZKjwyFyPu7EQf kECMB8F0/WcsvFiZQttYKg7nEAATjtiWQ/L7kbVaxwmOG0qiiG0iSicEJXiCENOo aALPcyE0yqPWuuueuDrRA22ZUvy/b+MpEMBrBxpYvb6qj7AtWdzbsMP0BKXFo/Q6 yR3K4QFD/a5WeQtcqRo2YDtARyiBdHvl7rs+VL/NVRmnEAy/3y7mIQr++2XDEQRD E4mp8JmJWjSgAUHDJgYQMcdcpi5+QSJVr5puhDqjACEzKGRMeKgT0uxXu0S5mjNN Wj92MmAJOhk/Eh7h1yZSYeSaqA3sxWy+aYO5ydwywS4VIBNpRyygQV173BCZek/A u1QWrN3uhkeP+DvSSEsl2E1VFQGXBuN12nvGSsC7DwhiJaoMZsdMR7V3qgCUm+Fn YE7XCNvfYg8= =OAEX -----END PGP SIGNATURE-----