The tog-pegasus packages provide OpenPegasus Web-Based EnterpriseManagement (WBEM) services. WBEM is a platform and resource independentDistributed Management Task Force (DMTF) standard that defines a commoninformation model and communication protocol for monitoring and controllingresources.Red Hat defines additional security enhancements for OpenGroup Pegasus WBEMservices in addition to those defined by the upstream OpenGroup Pegasusrelease. For details regarding these enhancements, refer to the file"README.RedHat.Security", included in the Red Hat tog-pegasus package.After re-basing to version 2.7.0 of the OpenGroup Pegasus code, theseadditional security enhancements were no longer being applied. As aconsequence, access to OpenPegasus WBEM services was not restricted to thededicated users as described in README.RedHat.Security. An attacker able toauthenticate using a valid user account could use this flaw to sendrequests to WBEM services. (CVE-2008-4313)Note: default SELinux policy prevents tog-pegasus from modifying systemfiles. This flaw's impact depends on whether or not tog-pegasus is confinedby SELinux, and on any additional CMPI providers installed and enabled on aparticular system.Failed authentication attempts against the OpenPegasus CIM server were notlogged to the system log as documented in README.RedHat.Security. Anattacker could use this flaw to perform password guessing attacks against auser account without leaving traces in the system log. (CVE-2008-4315)All tog-pegasus users are advised to upgrade to these updated packages,which contain patches to correct these issues.