CVE-2019-14867
ipa: Denial of service in IPA server due to wrong use of ber_scanf()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
Se encontró un fallo en IPA, todas las versiones 4.6.x anteriores a la versión 4.6.7, todas las versiones 4.7.x anteriores a la 4.7.4 y todas las versiones 4.8.x anteriores a 4.8.3, en la manera en que la API de procesamiento por lotes de FreeIPA registró operaciones. Esto incluía pasar contraseñas de usuario en texto sin cifrar en los maestros de FreeIPA. El procesamiento por lotes de comandos con contraseñas como argumentos u opciones no se realiza por defecto en FreeIPA, pero es posible mediante componentes de terceros. Un atacante que tenga acceso a los registros del sistema en los maestros de FreeIPA podría usar este fallo para producir el contenido del archivo de registro con las contraseñas expuestas.
A flaw was found in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-08-10 CVE Reserved
- 2019-11-27 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867 | Issue Tracking | |
https://www.freeipa.org/page/Releases/4.6.7 | Release Notes | |
https://www.freeipa.org/page/Releases/4.7.4 | Release Notes | |
https://www.freeipa.org/page/Releases/4.8.3 | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.6.0 < 4.6.7 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.6.0 < 4.6.7" | - |
Affected
| ||||||
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.7.0 < 4.7.4 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.7.0 < 4.7.4" | - |
Affected
| ||||||
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.8.0 < 4.8.3 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.8.0 < 4.8.3" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 30 Search vendor "Fedoraproject" for product "Fedora" and version "30" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
|