First published: Wed Nov 05 2014(Updated: )
A flaw was reported [1] in FreeIPA 4.0/4.1 where users could log in using only the OTP value. This arose because ipapwd_authentication() successfully determined that an empty password was invalid, but 389 itself would see this as an anonymous bind. This will be fixed in the next release [2]. As support for OTP is not available in earlier versions, only FreeIPA >= 4.0 is affected. [1] <a href="https://fedorahosted.org/freeipa/ticket/4690">https://fedorahosted.org/freeipa/ticket/4690</a> [2] <a href="https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html">https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html</a> Acknowledgements: Red Hat would like to thank FreeIPA upstream for reporting this issue. Statement: This issue did not affect the versions of IPA as shipped with Red Hat Enterprise Linux 5, 6, or 7 as they did not include support for OTP.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeIPA | =4.0.0 | |
FreeIPA | =4.0.1 | |
FreeIPA | =4.0.2 | |
FreeIPA | =4.0.3 | |
FreeIPA | =4.0.4 | |
FreeIPA | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7828 has a medium severity due to the potential for unauthorized access using only the OTP value.
To fix CVE-2014-7828, upgrade FreeIPA to version 4.1.1 or later.
FreeIPA versions 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, and 4.1.1 are affected by CVE-2014-7828.
CVE-2014-7828 impacts the authentication mechanism, allowing users to log in with an OTP alone.
No official workaround is provided for CVE-2014-7828; upgrading to the fixed version is recommended.