First published: Wed Nov 05 2014(Updated: )
A flaw was reported [1] in FreeIPA 4.0/4.1 where users could log in using only the OTP value. This arose because ipapwd_authentication() successfully determined that an empty password was invalid, but 389 itself would see this as an anonymous bind. This will be fixed in the next release [2]. As support for OTP is not available in earlier versions, only FreeIPA >= 4.0 is affected. [1] <a href="https://fedorahosted.org/freeipa/ticket/4690">https://fedorahosted.org/freeipa/ticket/4690</a> [2] <a href="https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html">https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html</a> Acknowledgements: Red Hat would like to thank FreeIPA upstream for reporting this issue. Statement: This issue did not affect the versions of IPA as shipped with Red Hat Enterprise Linux 5, 6, or 7 as they did not include support for OTP.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freeipa Freeipa | =4.0.0 | |
Freeipa Freeipa | =4.0.1 | |
Freeipa Freeipa | =4.0.2 | |
Freeipa Freeipa | =4.0.3 | |
Freeipa Freeipa | =4.0.4 | |
Freeipa Freeipa | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.