Page 2 of 9 results (0.005 seconds)

CVSS: 8.1EPSS: 0%CPEs: 10EXPL: 0

A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. Se ha encontrado una vulnerabilidad en ipa en versiones anteriores a la 4.4. Los comandos ca-del, ca-disable, y ca-enable de IdM no comprobaban correctamente los permisos del usuario mientras modificaban las CA en Dogtag. • http://rhn.redhat.com/errata/RHSA-2017-0388.html http://www.securityfocus.com/bid/96557 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2590 https://access.redhat.com/security/cve/CVE-2017-2590 https://bugzilla.redhat.com/show_bug.cgi?id=1413137 • CWE-275: Permission Issues CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user that belongs to a large number of groups. La función get_user_grouplist en el plug-in extdom en FreeIPA en versiones anteriores a 4.1.4 no reasigna memoria correctamente cuando procesa las cuentas de usuarios, lo que permite a atacantes remotos causar denegación de servicio (caída) a través de una solicitud de lista de grupo para un usuario que pertenece a un número grande de grupos. It was discovered that the IPA extdom Directory Server plug-in did not correctly perform memory reallocation when handling user account information. A request for a list of groups for a user that belongs to a large number of groups would cause a Directory Server to crash. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154314.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154103.html http://rhn.redhat.com/errata/RHSA-2015-0728.html http://www.securityfocus.com/bid/73376 https://bugzilla.redhat.com/show_bug.cgi?id=1205200 https://fedorahosted.org/freeipa/ticket/4908 https://access.redhat.com/security/cve/CVE-2015-1827 • CWE-19: Data Processing Errors CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 0

Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation. Vulnerabilidad de XSS en la IU Web en FreeIPA 4.x anterior a 4.1.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores relacionados con la navegación 'breadcrumb'. • http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144848.html https://bugzilla.redhat.com/show_bug.cgi?id=1165280 https://fedorahosted.org/freeipa/ticket/4742 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 0%CPEs: 6EXPL: 0

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind. FreeIPA 4.0.x anterior a 4.0.5 y 4.1.x anterior a 4.1.1, cuando 2FA está activado, permite a atacantes remotos evadir la contraseña requerida por la autenticación de dos factores aprovechando un token OTP habilitado, lo que provoca un bind anónimo. • http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143000.html http://www.freeipa.org/page/Releases/4.1.1 http://www.securityfocus.com/bid/70932 https://bugzilla.redhat.com/show_bug.cgi?id=1160871 https://exchange.xforce.ibmcloud.com/vulnerabilities/98500 https://fedorahosted.org/freeipa/ticket/4690 https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html https://www.redhat.com/archives/freeipa-users/2014-November/msg00077.html • CWE-264: Permissions, Privileges, and Access Controls •