Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03aHBqLWhmY3ItNXF3bc0ZPA
Code injection in FreeIPA
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
Permalink: https://github.com/advisories/GHSA-7hpj-hfcr-5qwmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03aHBqLWhmY3ItNXF3bc0ZPA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-7hpj-hfcr-5qwm, CVE-2019-14867
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-14867
- https://access.redhat.com/errata/RHBA-2019:4268
- https://access.redhat.com/errata/RHSA-2020:0378
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867
- https://github.com/pypa/advisory-db/tree/main/vulns/ipa/PYSEC-2019-28.yaml
- https://lists.fedoraproject.org/archives/list/[email protected]/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.8.3
- https://github.com/advisories/GHSA-7hpj-hfcr-5qwm
Blast Radius: 0.0
Affected Packages
pypi:ipa
Dependent packages: 0Dependent repositories: 1
Downloads: 253 last month
Affected Version Ranges: >= 4.8.0, < 4.8.3, >= 4.7.0, < 4.7.4, >= 4.6.2, < 4.6.7
Fixed in: 4.8.3, 4.7.4, 4.6.7
All affected versions: 4.6.2, 4.6.3, 4.6.4, 4.6.5, 4.7.0, 4.7.1, 4.7.2, 4.8.0, 4.8.1, 4.8.2
All unaffected versions: 4.5.0, 4.5.2, 4.5.4, 4.6.7, 4.7.4, 4.7.5, 4.8.3, 4.8.5, 4.8.6, 4.8.7, 4.8.9, 4.9.12, 4.10.2