First published: Mon Apr 24 2017(Updated: )
Pivotal Cloud Foundry 239 and earlier, UAA (aka User Account and Authentication Server) 3.4.1 and earlier, UAA release 12.2 and earlier, PCF (aka Pivotal Cloud Foundry) Elastic Runtime 1.6.x before 1.6.35, and PCF Elastic Runtime 1.7.x before 1.7.13 does not validate if a certificate is expired.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | >=3.4.0<3.4.2 | 3.4.2 |
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | >=3.0.0<3.3.0.3 | 3.3.0.3 |
Cloud Foundry | <=239 | |
Pivotal Cloud Foundry Elastic Runtime | >=1.6.0<1.6.35 | |
Pivotal Cloud Foundry Elastic Runtime | >=1.7.0<1.7.13 | |
Cloud Foundry User Account and Authentication (UAA) | <=3.4.1 | |
Pivotal Software Cloud Foundry UAA | <=12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5016 is classified as a medium severity vulnerability.
To fix CVE-2016-5016, upgrade to Cloud Foundry UAA version 3.4.2 or later, or to Pivotal Cloud Foundry Elastic Runtime versions 1.6.35 or 1.7.13 and later.
Pivotal Cloud Foundry versions up to 239 are affected by CVE-2016-5016.
You should update the User Account and Authentication Server (UAA) and Pivotal Cloud Foundry Elastic Runtime components.
Yes, UAA version 3.4.1 and earlier are vulnerable to CVE-2016-5016.