First published: Tue Nov 15 2016(Updated: )
Due to a missing permission check, certprofile-mod can be used by an authenticated but unprivileged user to modify certificate profile configuration. This could allow the issuance of certificates with fraudulent subject naming information (allowing the holder of the private key to impersonate another entity), or inappropriate key usage or extended key usage information (use of certificate for unauthorised purposes e.g. code signing). Affected versions : 4.2 and above (all versions supporting certificate profiles) Upstream patch : <a href="https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=fec4c32ff15a96736740cf7d2f713a21af0b227e">https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=fec4c32ff15a96736740cf7d2f713a21af0b227e</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <4.3.3 | 4.3.3 |
redhat/ipa | <4.4.3 | 4.4.3 |
FreeIPA | =4.2.0 | |
FreeIPA | =4.2.0-alpha1 | |
FreeIPA | =4.2.1 | |
FreeIPA | =4.2.2 | |
FreeIPA | =4.2.3 | |
FreeIPA | =4.2.4 | |
FreeIPA | =4.3.0 | |
FreeIPA | =4.3.1 | |
FreeIPA | =4.3.2 | |
FreeIPA | =4.4.0 | |
FreeIPA | =4.4.1 | |
FreeIPA | =4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9575 is classified as a medium severity vulnerability due to the potential for unprivileged users to modify certificate profiles.
To fix CVE-2016-9575, upgrade the FreeIPA software to a version that is 4.4.3 or later.
CVE-2016-9575 affects FreeIPA versions 4.2.0 through 4.4.2.
Exploiting CVE-2016-9575 allows an attacker to issue fraudulent certificates by modifying the certificate profile configuration.
CVE-2016-9575 can be exploited by any authenticated but unprivileged user within the affected systems.