First published: Thu Apr 27 2017(Updated: )
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus NetIQ eDirectory | =9.0 | |
Micro Focus NetIQ eDirectory | =9.0.1 | |
Micro Focus NetIQ eDirectory | =9.0.2 | |
NetIQ iManager | =3.0 | |
NetIQ iManager | =3.0.1 | |
NetIQ iManager | =3.0.2 | |
Novell eDirectory | <=8.8 | |
NetIQ iManager | <=2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5186 has a medium severity level due to the usage of the deprecated MD5 hashing algorithm in communications certificates.
To fix CVE-2017-5186, upgrade to the latest versions of Novell iManager or eDirectory that are patched against this vulnerability.
CVE-2017-5186 affects Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, and various versions of Novell and NetIQ eDirectory.
Using the deprecated MD5 hashing algorithm in CVE-2017-5186 exposes data to potential tampering and impacts the integrity of secure communications.
There are no documented workarounds for CVE-2017-5186; upgrading to a secure version is the recommended course of action.