Vulnerability CVE-2015-1848


Published: 2015-05-14

Description:
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Redhat -> Enterprise linux high availability 
Redhat -> Enterprise linux high availability eus 
Redhat -> Enterprise linux resilient storage 
Redhat -> Enterprise linux resilient storage eus 
Fedora -> Pacemaker configuration system 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html
http://rhn.redhat.com/errata/RHSA-2015-0980.html
http://rhn.redhat.com/errata/RHSA-2015-0990.html
http://www.securityfocus.com/bid/74623
https://bugzilla.redhat.com/attachment.cgi?id=1009855

Copyright 2024, cxsecurity.com

 

Back to Top