ID CVE-2011-4083
Summary The sosreport utility in the Red Hat sos package before 1.7-9 and 2.x before 2.2-17 includes (1) Certificate-based Red Hat Network private entitlement keys and the (2) private key for the entitlement in an archive of debugging information, which might allow remote attackers to obtain sensitive information by reading the archive.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:sos:2.2-3
    cpe:2.3:a:redhat:sos:2.2-3
  • cpe:2.3:a:redhat:sos:2.2-6
    cpe:2.3:a:redhat:sos:2.2-6
  • cpe:2.3:a:redhat:sos:2.2-7
    cpe:2.3:a:redhat:sos:2.2-7
  • cpe:2.3:a:redhat:sos:2.2-8
    cpe:2.3:a:redhat:sos:2.2-8
  • cpe:2.3:a:redhat:sos:2.2-9
    cpe:2.3:a:redhat:sos:2.2-9
  • cpe:2.3:a:redhat:sos:2.2-10
    cpe:2.3:a:redhat:sos:2.2-10
  • cpe:2.3:a:redhat:sos:2.2-11
    cpe:2.3:a:redhat:sos:2.2-11
  • cpe:2.3:a:redhat:sos:2.2-14
    cpe:2.3:a:redhat:sos:2.2-14
  • cpe:2.3:a:redhat:sos:2.2-15
    cpe:2.3:a:redhat:sos:2.2-15
  • cpe:2.3:a:redhat:sos:2.2-16
    cpe:2.3:a:redhat:sos:2.2-16
  • cpe:2.3:a:redhat:sos:1.7-6
    cpe:2.3:a:redhat:sos:1.7-6
  • cpe:2.3:a:redhat:sos:1.7-8
    cpe:2.3:a:redhat:sos:1.7-8
  • cpe:2.3:a:redhat:sos:1.7
    cpe:2.3:a:redhat:sos:1.7
  • cpe:2.3:a:redhat:sos:1.6
    cpe:2.3:a:redhat:sos:1.6
CVSS
Base: 4.3 (as of 18-02-2014 - 19:40)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0153.NASL
    description An updated sos package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 5.8 Technical Notes, linked to in the References, for information on the most significant of these changes. All sos users are advised to upgrade to this updated package, which resolves these issues and adds these enhancements.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 58054
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58054
    title RHEL 5 : sos (RHSA-2012:0153)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0153.NASL
    description From Red Hat Security Advisory 2012:0153 : An updated sos package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 5.8 Technical Notes, linked to in the References, for information on the most significant of these changes. All sos users are advised to upgrade to this updated package, which resolves these issues and adds these enhancements.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68471
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68471
    title Oracle Linux 5 : sos (ELSA-2012-0153)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0153.NASL
    description An updated sos package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 5.8 Technical Notes, linked to in the References, for information on the most significant of these changes. All sos users are advised to upgrade to this updated package, which resolves these issues and adds these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 63564
    published 2013-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63564
    title CentOS 5 : sos (CESA-2012:0153)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120221_SOS_ON_SL5.NASL
    description Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based private entitlement keys for upstream updates in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access content available to the host. Scientific Linux systems cannot use this upstream service and are unaffected. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. All sos users are advised to upgrade to this updated package, which resolves these issues and adds these enhancements.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61270
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61270
    title Scientific Linux Security Update : sos on SL5.x
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-1536.NASL
    description An updated sos package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. All users of sos are advised to upgrade to this updated package, which contains backported patches to correct these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 57016
    published 2011-12-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57016
    title RHEL 6 : sos (RHSA-2011:1536)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20111206_SOS_ON_SL6.NASL
    description Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included aspects of TUV's Certificate-based private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access that content available to the host. This issue did not affect users of the 'Classic' access method. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. All users of sos are advised to upgrade to this updated package, which contains backported patches to correct these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61198
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61198
    title Scientific Linux Security Update : sos on SL6.x
redhat via4
advisories
  • bugzilla
    id 749383
    title CVE-2011-4083 sos: sosreport is gathering certificate-based RHN entitlement private keys
    oval
    AND
    • comment sos is earlier than 0:2.2-17.el6
      oval oval:com.redhat.rhsa:tst:20111536005
    • comment sos is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20111536006
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    rhsa
    id RHSA-2011:1536
    released 2011-12-06
    severity Low
    title RHSA-2011:1536: sos security, bug fix, and enhancement update (Low)
  • bugzilla
    id 750573
    title sosreport cluster modules fail with badly formed cluster.conf
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • comment sos is earlier than 0:1.7-9.62.el5
      oval oval:com.redhat.rhsa:tst:20120153002
    • comment sos is signed with Red Hat redhatrelease key
      oval oval:com.redhat.rhba:tst:20141200003
    rhsa
    id RHSA-2012:0153
    released 2012-02-21
    severity Low
    title RHSA-2012:0153: sos security, bug fix, and enhancement update (Low)
rpms
  • sos-0:2.2-17.el6
  • sos-0:1.7-9.62.el5
refmap via4
Last major update 18-02-2014 - 19:40
Published 17-02-2014 - 11:55
Back to Top