CVE-2010-1171
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
18/04/2011
Last modified:
11/04/2025
Description
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Impact
Base Score 2.0
5.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:satellite:5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:satellite:5.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/44150
- http://www.redhat.com/support/errata/RHSA-2011-0434.html
- http://www.securityfocus.com/bid/47316
- http://www.securitytracker.com/id?1025316=
- http://www.vupen.com/english/advisories/2011/0967
- https://bugzilla.redhat.com/show_bug.cgi?id=584118
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66690
- http://secunia.com/advisories/44150
- http://www.redhat.com/support/errata/RHSA-2011-0434.html
- http://www.securityfocus.com/bid/47316
- http://www.securitytracker.com/id?1025316=
- http://www.vupen.com/english/advisories/2011/0967
- https://bugzilla.redhat.com/show_bug.cgi?id=584118
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66690



