Rapid7 Vulnerability & Exploit Database

RHSA-2010:0922: Red Hat Enterprise MRG Messaging and Grid security update

Back to Search

RHSA-2010:0922: Red Hat Enterprise MRG Messaging and Grid security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
12/07/2010
Created
07/25/2018
Added
12/07/2010
Modified
07/12/2017

Description

Updated Red Hat Enterprise MRG Messaging and Grid packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Red Hat Enterprise MRG (Messaging, Realtime and Grid) is a real-time IT infrastructure for enterprise computing. MRG Messaging implements the Advanced Message Queuing Protocol (AMQP) standard, adding persistence options, kernel optimizations, and operating system services. The Management Console Installation Guide for Red Hat Enterprise MRG 1.3 instructed administrators to configure Condor to allow the MRG Management Console (cumin) to submit jobs on behalf of a user. This configuration facilitated a trust relationship between cumin and the Condor QMF plug-ins; however, there was inadequate access control on the trusted channel, allowing anyone able to publish to a broker to submit jobs to run as any other user (except root, as Condor does not run jobs as root). (CVE-2010-4179) These updated packages also include multiple bug fixes. Users are directed to the Red Hat Enterprise MRG 1.3 Technical Notes for information on these changes: http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1/html/Technical_Notes/RHSA-2010-0922.html All Red Hat Enterprise MRG users are advised to upgrade to these updated packages, which correct this issue and the issues noted in the Red Hat Enterprise MRG 1.3 Technical Notes. After installing the updated packages, Condor must be restarted for the update to take effect.

Solution(s)

  • redhat-upgrade-condor
  • redhat-upgrade-condor-kbdd
  • redhat-upgrade-condor-qmf
  • redhat-upgrade-python-qmf
  • redhat-upgrade-qmf
  • redhat-upgrade-qmf-devel
  • redhat-upgrade-qpid-cpp-client
  • redhat-upgrade-qpid-cpp-client-devel
  • redhat-upgrade-qpid-cpp-client-devel-docs
  • redhat-upgrade-qpid-cpp-client-ssl
  • redhat-upgrade-qpid-cpp-server
  • redhat-upgrade-qpid-cpp-server-devel
  • redhat-upgrade-qpid-cpp-server-ssl
  • redhat-upgrade-qpid-cpp-server-store
  • redhat-upgrade-qpid-cpp-server-xml
  • redhat-upgrade-qpid-java-client
  • redhat-upgrade-qpid-java-common
  • redhat-upgrade-qpid-java-example
  • redhat-upgrade-rh-qpid-cpp-tests
  • redhat-upgrade-sesame

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;