Upstream information

CVE-2013-3710 at MITRE

Description

SUSE Lifecycle Management Server (SLMS) before 1.3.7 does not generate a new secret key when the service starts, which allows remote attackers to defeat intended cryptographic protection mechanisms by leveraging knowledge of this key from a product installation elsewhere.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 852101 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Lifecycle Management Server 1.3
  • slms >= 1.3.7-0.5.1
  • slms-core >= 1.3.7-0.5.1
  • slms-customer-center >= 1.3.7-0.5.1
  • slms-devel-doc >= 1.3.7-0.5.1
  • slms-external >= 1.3.7-0.5.1
  • slms-registration >= 1.3.7-0.5.1
  • slms-testsuite >= 1.3.7-0.5.1
Patchnames:
sleslms13-slms
SUSE Lifecycle Management Server 1.3
  • slms >= 1.3.7-0.5.1
  • slms-core >= 1.3.7-0.5.1
  • slms-customer-center >= 1.3.7-0.5.1
  • slms-devel-doc >= 1.3.7-0.5.1
  • slms-external >= 1.3.7-0.5.1
  • slms-registration >= 1.3.7-0.5.1
  • slms-testsuite >= 1.3.7-0.5.1
Builds
SAT Patch Nr: 8586