First published: Tue Nov 15 2016(Updated: )
Due to a missing permission check, certprofile-mod can be used by an authenticated but unprivileged user to modify certificate profile configuration. This could allow the issuance of certificates with fraudulent subject naming information (allowing the holder of the private key to impersonate another entity), or inappropriate key usage or extended key usage information (use of certificate for unauthorised purposes e.g. code signing). Affected versions : 4.2 and above (all versions supporting certificate profiles) Upstream patch : <a href="https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=fec4c32ff15a96736740cf7d2f713a21af0b227e">https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=fec4c32ff15a96736740cf7d2f713a21af0b227e</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <4.3.3 | 4.3.3 |
redhat/ipa | <4.4.3 | 4.4.3 |
Freeipa Freeipa | =4.2.0 | |
Freeipa Freeipa | =4.2.0-alpha1 | |
Freeipa Freeipa | =4.2.1 | |
Freeipa Freeipa | =4.2.2 | |
Freeipa Freeipa | =4.2.3 | |
Freeipa Freeipa | =4.2.4 | |
Freeipa Freeipa | =4.3.0 | |
Freeipa Freeipa | =4.3.1 | |
Freeipa Freeipa | =4.3.2 | |
Freeipa Freeipa | =4.4.0 | |
Freeipa Freeipa | =4.4.1 | |
Freeipa Freeipa | =4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.