SB2014110405 - Input validation error in FreeIPA
Published: November 4, 2014 Updated: August 10, 2020
Security Bulletin ID
SB2014110405
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2013-0336)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The ipapwd_chpwop function in daemons/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c in the directory server (dirsrv) in FreeIPA before 3.2.0 allows remote attackers to cause a denial of service (crash) via a connection request without a username/dn, related to the 389 directory server.
Remediation
Install update from vendor's website.
References
- http://secunia.com/advisories/52763
- http://www.securityfocus.com/bid/58747
- https://bugzilla.redhat.com/show_bug.cgi?id=913751
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83132
- https://fedorahosted.org/freeipa/ticket/3539
- https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e