First published: Wed Oct 24 2012(Updated: )
A temporary denial of service flaw was found in the way token processing system of Certificate System processed user certificate search queries with certain empty search fields. A remote attacker could use this flaw to cause the main Apache httpd web server broker it to need to restart (resulting into situation where the client would obtain connection reset instead of proper error message), leading to (temporary) denial of service (resulting into any users currently in the middle of enrolling tokens to experience a connection drop and their in progress operation to be terminated).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IETF X.509 Certificate | <=8.1.1 | |
IETF X.509 Certificate | =7.1 | |
IETF X.509 Certificate | =7.2 | |
IETF X.509 Certificate | =7.3 | |
IETF X.509 Certificate | =8.0 | |
IETF X.509 Certificate | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4556 has been classified with a moderate severity level due to its potential to cause a temporary denial of service.
To fix CVE-2012-4556, it is recommended to update the affected Red Hat Certificate System to a version that is not vulnerable.
CVE-2012-4556 affects Red Hat Certificate System versions 7.1, 7.2, 7.3, and 8.1.1, as well as versions 8.0 and 8.1.
Yes, an attacker can exploit CVE-2012-4556 remotely by using specific empty search fields in user certificate queries.
Exploiting CVE-2012-4556 can result in a temporary denial of service that forces the main Apache HTTP server to restart.