CVE-2015-1848
14.05.2015, 14:59
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.Enginsight
Vendor | Product | Version |
---|---|---|
fedora | pacemaker_configuration_system | 𝑥 ≤ 0.9.137 |
redhat | enterprise_linux_high_availability | 6.0 |
redhat | enterprise_linux_high_availability | 7.0 |
redhat | enterprise_linux_high_availability_eus | 6.6.z:z |
redhat | enterprise_linux_high_availability_eus | 7.1 |
redhat | enterprise_linux_resilient_storage | 6.0 |
redhat | enterprise_linux_resilient_storage | 7.0 |
redhat | enterprise_linux_resilient_storage_eus | 6.6.z:z |
redhat | enterprise_linux_resilient_storage_eus | 7.1 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References