fkie_cve-2012-5484
Vulnerability from fkie_nvd
Published
2013-01-27 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate.
References
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0188.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0189.html
secalert@redhat.comhttp://www.freeipa.org/page/CVE-2012-5484Vendor Advisory
secalert@redhat.comhttp://www.freeipa.org/page/Releases/3.1.2
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0188.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0189.html
af854a3a-2127-422b-91ae-364da2661108http://www.freeipa.org/page/CVE-2012-5484Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.freeipa.org/page/Releases/3.1.2
Impacted products
Vendor Product Version
redhat freeipa 2.0.0
redhat freeipa 2.0.1
redhat freeipa 2.1.0
redhat freeipa 2.1.1
redhat freeipa 2.1.3
redhat freeipa 2.1.4
redhat freeipa 2.2.1
redhat freeipa 3.0.0
redhat freeipa 3.0.1
redhat freeipa 3.0.2
redhat freeipa 3.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61635E9E-FA0F-43DD-956D-6A65CC349DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8002A146-BC41-45D1-BDBE-13A99A83B81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A3C75F-9A29-43DA-99D9-A012E43C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7812FB3-207A-4A88-88B5-2413DE7F843B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D0A859-34B4-4A2B-9DDE-49224B6BE161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17AACA8-52EA-4A9D-A02C-4064E7056454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF167865-60B0-4350-B2F3-5AB037F1A3BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EC0B67-0A62-40DB-AB3D-47251D6A9A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4876ACC-1CF4-4674-8DD0-D64E028F5FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A987D93-5427-4954-8C6C-E7C295A09BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BED799E-F847-4FAD-8EE0-CAB1DA6C0558",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate."
    },
    {
      "lang": "es",
      "value": "El cliente FreeIPA v2.x y v3.x anterior a v3.1.2 no obtiene de forma adecuada el certificado Certification Authority (CA) del servidor, lo que permite ataques man-in-the-middle para falsear el procedimiento de conexi\u00f3n a trav\u00e9s de un certificado manipulado."
    }
  ],
  "id": "CVE-2012-5484",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-01-27T18:55:02.070",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0188.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0189.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.freeipa.org/page/CVE-2012-5484"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.freeipa.org/page/Releases/3.1.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0189.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.freeipa.org/page/CVE-2012-5484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.freeipa.org/page/Releases/3.1.2"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…