2017-02-17
ALT-BU-2017-2937-1
Branch p8 update bulletin.
Closed vulnerabilities
Published: 2017-08-28
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2016-7030
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- RHSA-2017:0001
- RHSA-2017:0001
- [oss-security] 20170102 freeIPA CVEs CVE-2016-9575 (insufficient permission check) & CVE-2016-7030 (DoS)
- [oss-security] 20170102 freeIPA CVEs CVE-2016-9575 (insufficient permission check) & CVE-2016-7030 (DoS)
- 94934
- 94934
- https://bugzilla.redhat.com/show_bug.cgi?id=1370493
- https://bugzilla.redhat.com/show_bug.cgi?id=1370493
- https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61
- https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61
Published: 2018-03-13
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2016-9575
Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.
Severity: MEDIUM (6.3)
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
References:
Closed bugs
Ошибка при вводе машины в домен FreeIPA
После настройки trust-а не стартует FreeIPA