First published: Thu Jun 28 2012(Updated: )
It was discovered that the Red Hat Certificate System's / Dogtag Certificate System's Certificate Manager did not properly check certificate revocation requests. An agent permitted to perform revocations of end entity certificates via Certificate System's web interface could use this flaw to revoke the Certificate Authority (CA) certificate. The issue was originally reported via <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=832212">bug #832212</a>. Patch applied to address this issue: <a href="https://fedorahosted.org/pki/changeset/2430">https://fedorahosted.org/pki/changeset/2430</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Certificate System | <=8.1 | |
Red Hat Certificate System | =7.1 | |
Red Hat Certificate System | =7.2 | |
Red Hat Certificate System | =7.3 | |
Red Hat Certificate System | =8 | |
Red Hat Certificate System | =8.0 | |
Dogtag Certificate System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3367 has been classified as a medium severity vulnerability.
To fix CVE-2012-3367, upgrade the Red Hat Certificate System or Dogtag Certificate System to a version that includes the security patch addressing this vulnerability.
CVE-2012-3367 affects Red Hat Certificate System versions up to and including 8.1, and specific versions 7.1, 7.2, and 7.3.
Both Red Hat Certificate System and Dogtag Certificate System are impacted by CVE-2012-3367.
Yes, an attacker with proper permissions can exploit CVE-2012-3367 remotely through the Certificate System's web interface.