First published: Fri Jul 27 2018(Updated: )
A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat FreeIPA | <4.4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2590 has been assigned a medium severity level due to potential denial of service impacts.
To mitigate CVE-2017-2590, upgrade to FreeIPA version 4.4.0 or later and ensure strict permission checks are in place for CA management.
CVE-2017-2590 affects FreeIPA versions prior to 4.4.0 and specific versions of Red Hat Enterprise Linux 7.0, 7.3, 7.4, and 7.5.
An authenticated, unauthorized attacker could exploit CVE-2017-2590 to delete, disable, or enable CAs, leading to denial of service.
CVE-2017-2590 is a local exploit, as it requires authenticated access to the system.