First published: Wed Jul 27 2016(Updated: )
It was found that FreeIPA fails to check the CA ACLs properly, moreover the SAN name is incorrectly checked for service principals which means someone can request an arbitrary SAN name for services. The vulnerable code was added in the 4.4.0 release, which is not yet available in Fedora or RHEL.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat FreeIPA | >=4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1360757 is considered critical due to improper CA ACL checks and arbitrary SAN name requests.
To fix REDHAT-BUG-1360757, update FreeIPA to a version that corrects the ACL checking and SAN validation issues.
FreeIPA version 4.4.0 and later are affected by the vulnerability identified in REDHAT-BUG-1360757.
The potential risks include unauthorized access and the ability for attackers to impersonate services using arbitrary SAN names.
Currently, there is no officially recommended workaround for REDHAT-BUG-1360757, and updating FreeIPA is the best course of action.