First published: Fri Mar 22 2013(Updated: )
Format string vulnerability in the token processing system (pki-tps) in Red Hat Certificate System (RHCS) 8.1 and possibly Dogtag Certificate System 9 and 10 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in unspecified vectors, related to viewing certificates.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-tps | <8.1.5-1.el5 | 8.1.5-1.el5 |
Red Hat Certificate System | =8.1 | |
Dogtag Certificate System | =9.0 | |
Dogtag Certificate System | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1886 has a moderate severity level, allowing for potential denial of service and arbitrary code execution.
To fix CVE-2013-1886, upgrade to pki-tps version 8.1.5-1.el5 or later, and ensure you are using a patched version of the affected Dogtag Certificate System.
CVE-2013-1886 affects remote authenticated users of Red Hat Certificate System 8.1 and Dogtag Certificate Systems 9 and 10.
CVE-2013-1886 enables remote authenticated users to exploit a format string vulnerability potentially leading to a denial of service or arbitrary code execution.
As of the last update, there have been no confirmed reports of active exploitation for CVE-2013-1886.