Page 2 of 11 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

FreeIPA might display user data improperly via vectors involving non-printable characters. FreeIPA podría mostrar de forma incorrecta datos de usuario mediante vectores que incluyen caracteres que no se pueden imprimir. • https://bugzilla.redhat.com/show_bug.cgi?id=1252567 https://pagure.io/freeipa/issue/5153 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 31EXPL: 0

FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern ** EN DISPUTA ** Las versiones 4.x de FreeIPA que tengan la versión 2.213 de la API permiten que usuarios autenticados remotos omitan las restricciones de bloqueo de cuenta previstas mediante una acción de desbloqueo con un ID de sesión antiguo (para la misma cuenta de usuario) que se había creado para una sesión anterior. NOTA: El fabricante afirma que no existe este problema en este producto y no reconoce este informe como un problema de seguridad válido. FreeIPA version 2.213 suffers from a session hijacking vulnerability. • http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html • CWE-384: Session Fixation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services. FreeIPA 4.4.0 permite a atacantes remotos solicitar un nombre SAN arbitrario para los servicios. • https://bugzilla.redhat.com/attachment.cgi?id=1184610 https://bugzilla.redhat.com/show_bug.cgi?id=1360757 • CWE-284: Improper Access Control •

CVSS: 8.1EPSS: 0%CPEs: 10EXPL: 0

A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. Se ha encontrado una vulnerabilidad en ipa en versiones anteriores a la 4.4. Los comandos ca-del, ca-disable, y ca-enable de IdM no comprobaban correctamente los permisos del usuario mientras modificaban las CA en Dogtag. • http://rhn.redhat.com/errata/RHSA-2017-0388.html http://www.securityfocus.com/bid/96557 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2590 https://access.redhat.com/security/cve/CVE-2017-2590 https://bugzilla.redhat.com/show_bug.cgi?id=1413137 • CWE-275: Permission Issues CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on. FreelPA utiliza una política de contraseñas por defecto que bloquea una cuenta después de 5 intentos de autenticación fallidos, lo que permite a los atacantes remotos que provoquen una denegación de servicio al bloquear la cuenta en la que se están ejecutando los servicios del sistema. It was discovered that the default IdM password policies that lock out accounts after a certain number of failed login attempts were also applied to host and service accounts. A remote unauthenticated user could use this flaw to cause a denial of service attack against kerberized services. • http://rhn.redhat.com/errata/RHSA-2017-0001.html http://www.openwall.com/lists/oss-security/2017/01/02/5 http://www.securityfocus.com/bid/94934 https://bugzilla.redhat.com/show_bug.cgi?id=1370493 https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61 https://access.redhat.com/security/cve/CVE-2016-7030 • CWE-255: Credentials Management Errors •