LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Moderate: conga security, bug fix, Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated conga packages that fix a security flaw, several bugs, and add enhancements are now available for Red Hat Cluster Suite. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: conga security, bug fix, and enhancement update
Advisory ID:       RHSA-2007:0983-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0983.html
Issue date:        2007-11-21
Updated on:        2007-11-21
Product:           Red Hat Cluster Suite
CVE Names:         CVE-2007-4136 
- ---------------------------------------------------------------------

1. Summary:

Updated conga packages that fix a security flaw, several bugs, and add
enhancements are now available for Red Hat Cluster Suite.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Cluster Suite 4AS - i386, ia64, x86_64
Red Hat Cluster Suite 4ES - i386, ia64, x86_64
Red Hat Cluster Suite 4WS - i386, ia64, x86_64

3. Problem description:

The Conga package is a web-based administration tool for remote cluster and
storage management.

A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, resulting in a denial of service. (CVE-2007-4136)

Additionally, these updated packages fix the following bugs:

* entering an invalid password when creating a new cluster with the luci
web application caused a "UnboundLocalError" error.

* conga did not set the the "nodename" attribute for instances of manual
fencing, resulting in manual fencing being non-functional.

* conga did not provide a way to remove a dead node from a cluster.
Attempting to remove a dead node from a cluster resulted in an error,
reporting that that the node name cannot be reached.

* during cluster formation Conga reboots the cluster nodes. During reboot
errors about not being able to communicate with nodes are displayed. These
errors can safely be ignored, and have been removed in these updated
packages.

* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not
generate node ID attributes for clusternode tags. The node ID attributes
are needed by programs such as qdisk.

* during Quorum Partition Configuration, a "TypeError" error occurred if
you did not configure heuristics.

* when passing arguments to fence_scsi, Conga used the "nodename" attribute
instead of the "node" attribute, resulting in an invalid XML file being
passed to fence_scsi. The "nodename" attribute is now supported.

* conga did not handle the restart operation correctly. In certain
situations this resulted in nodes not being started, stopped, and restarted
correctly. These issues were caused by clusters starting while others were
still in the process of stopping. This has been resolved in these updated
packages.

* probing storage using luci and the Mozilla Firefox 2 web browser on
Microsoft Windows XP appeared to never finish, when in fact it had. After
probing, clicking the node name in the storage list correctly showed the
storage for that node.

As well, these updated packages add the following enhancements:

* the Conga web interface now supports the Microsoft Internet Explorer web
browser, versions 6.0 and later.

* in previous packages, Conga required a minimum score to be configured
even when heuristics were not being used. A minimum score is no longer
required.

All Conga users are advised to upgrade to these updated packages, which
fix this vulnerability, resolve these issues, and add these enhancements.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

227723 - Entering bad password when creating a new cluster = UnboundLocalError: local variable 'e' referenced before assignment
238656 - conga does not set the "nodename" attribute for manual fencing
238727 - Conga provides no way to remove a dead node from a cluster
241414 - Installation using Conga shows "error" in message during reboot cycle.
245200 - Conga needs to support Internet Explorer 6.0 and later
253901 - No node IDs generated on new RHEL4 / DLM cluster
253905 - Quorum disk page: Minimum score does not need to be required
253906 - Quorum disk page: Error when trying to continue w/o a heuristic
286951 - conga passes fence_scsi nodename, where as it accepts only node
325501 - conga doesn't handle the cluster restart operation properly
336101 - CVE-2007-4136 ricci is vulnerable to a connect DoS attack
340101 - Storage redirection after probe does not work on WinXP with FF2

6. RPMs required:

Red Hat Cluster Suite 4AS:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/RHCS/SRPMS/conga-0.11.0-3.src.rpm
b992c3a5173d7712bbfc342dc8b28414  conga-0.11.0-3.src.rpm

i386:
f54f296e498593ff0f0bb26333083217  conga-debuginfo-0.11.0-3.i386.rpm
aba9489bb5e5b33891f42afa30c1f6b8  luci-0.11.0-3.i386.rpm
2c414b9df48969dbe46423fa68f43599  ricci-0.11.0-3.i386.rpm

ia64:
b4124d5f5825535d25c6649c16344efb  conga-debuginfo-0.11.0-3.ia64.rpm
d7fe494639979615ac1927f3421294bf  luci-0.11.0-3.ia64.rpm
5eb8e073a575c78729217ea6f9a2d939  ricci-0.11.0-3.ia64.rpm

x86_64:
a7288c6eb4e9667f495bbe2be78f2372  conga-debuginfo-0.11.0-3.x86_64.rpm
2c657c9aaffd6b546d943d6b6a093260  luci-0.11.0-3.x86_64.rpm
21492794c454d2903645c4a808131dce  ricci-0.11.0-3.x86_64.rpm

Red Hat Cluster Suite 4ES:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/RHCS/SRPMS/conga-0.11.0-3.src.rpm
b992c3a5173d7712bbfc342dc8b28414  conga-0.11.0-3.src.rpm

i386:
f54f296e498593ff0f0bb26333083217  conga-debuginfo-0.11.0-3.i386.rpm
aba9489bb5e5b33891f42afa30c1f6b8  luci-0.11.0-3.i386.rpm
2c414b9df48969dbe46423fa68f43599  ricci-0.11.0-3.i386.rpm

ia64:
b4124d5f5825535d25c6649c16344efb  conga-debuginfo-0.11.0-3.ia64.rpm
d7fe494639979615ac1927f3421294bf  luci-0.11.0-3.ia64.rpm
5eb8e073a575c78729217ea6f9a2d939  ricci-0.11.0-3.ia64.rpm

x86_64:
a7288c6eb4e9667f495bbe2be78f2372  conga-debuginfo-0.11.0-3.x86_64.rpm
2c657c9aaffd6b546d943d6b6a093260  luci-0.11.0-3.x86_64.rpm
21492794c454d2903645c4a808131dce  ricci-0.11.0-3.x86_64.rpm

Red Hat Cluster Suite 4WS:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/RHCS/SRPMS/conga-0.11.0-3.src.rpm
b992c3a5173d7712bbfc342dc8b28414  conga-0.11.0-3.src.rpm

i386:
f54f296e498593ff0f0bb26333083217  conga-debuginfo-0.11.0-3.i386.rpm
aba9489bb5e5b33891f42afa30c1f6b8  luci-0.11.0-3.i386.rpm
2c414b9df48969dbe46423fa68f43599  ricci-0.11.0-3.i386.rpm

ia64:
b4124d5f5825535d25c6649c16344efb  conga-debuginfo-0.11.0-3.ia64.rpm
d7fe494639979615ac1927f3421294bf  luci-0.11.0-3.ia64.rpm
5eb8e073a575c78729217ea6f9a2d939  ricci-0.11.0-3.ia64.rpm

x86_64:
a7288c6eb4e9667f495bbe2be78f2372  conga-debuginfo-0.11.0-3.x86_64.rpm
2c657c9aaffd6b546d943d6b6a093260  luci-0.11.0-3.x86_64.rpm
21492794c454d2903645c4a808131dce  ricci-0.11.0-3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4136
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.