Python rhn-setup is prone to a security-bypass vulnerability.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks.
Information
Exploit
An attacker can use readily available tools to exploit this issue.
References:
- Bug 1198740 - (CVE-2015-1777) CVE-2015-1777 rhn-setup: rhnreg_ks fails to proper (Red Hat Bugzilla)
- Python Homepage (Python)
- CVE-2015-1777 (Redhat)