The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html | |
http://rhn.redhat.com/errata/RHSA-2015-0980.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0990.html | Third Party Advisory |
http://www.securityfocus.com/bid/74623 | Third Party Advisory |
https://bugzilla.redhat.com/attachment.cgi?id=1009855 | Exploit Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2015-05-14T14:00:00
Updated: 2016-12-29T18:57:01
Reserved: 2015-02-17T00:00:00
Link: CVE-2015-1848
JSON object: View
NVD Information
Status : Modified
Published: 2015-05-14T14:59:07.897
Modified: 2023-11-07T02:24:58.063
Link: CVE-2015-1848
JSON object: View
Redhat Information
No data.
CWE