First published: Wed Oct 24 2012(Updated: )
A denial of service flaw was found in the way token processing system of Certificate System processed interrupted token format operations. A local attacker, via suddenly interrupting the token format operation, could use this flaw to cause pki-tps infrastructure to crash with NULL pointer dereference, subsequently leading to relevant Apache httpd web server worker it to need to restart, rendering it to be unavailable for short period of time possibly halting (already) in-progress operations of other users.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Certificate System | <=8.1.1 | |
Red Hat Certificate System | =7.1 | |
Red Hat Certificate System | =7.2 | |
Red Hat Certificate System | =7.3 | |
Red Hat Certificate System | =8 | |
Red Hat Certificate System | =8.0 | |
Red Hat Certificate System | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4555 is classified as a denial of service vulnerability.
To fix CVE-2012-4555, update the Red Hat Certificate System to the latest patched version.
CVE-2012-4555 affects Red Hat Certificate System versions up to and including 8.1.1, and 7.1, 7.2, and 7.3 specifically.
CVE-2012-4555 requires local access to exploit, making it a local denial of service attack.
Exploitation of CVE-2012-4555 could lead to crashes of the pki-tps infrastructure due to NULL pointer dereference.