First published: Mon Jan 20 2020(Updated: )
A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <0:4.6.8-5.el7 | 0:4.6.8-5.el7 |
Red Hat FreeIPA | >=4.0.0<=4.8.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1722 is classified as a denial of service vulnerability due to the potential for memory and CPU exhaustion.
To mitigate CVE-2020-1722, upgrade to versions 4.8.1 or later of the affected IPA software.
CVE-2020-1722 affects all IPA versions from 4.0.0 up to 4.8.0.
Exploiting CVE-2020-1722 can lead to a denial of service, causing the IPA server to become unresponsive.
CVE-2020-1722 is most relevant to systems running Red Hat Enterprise Linux versions 6.0, 7.0, and 8.0 with affected IPA versions.