FKIE_CVE-2012-5484

Vulnerability from fkie_nvd - Published: 2013-01-27 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate.
References
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9
secalert@redhat.comhttp://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0188.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0189.html
secalert@redhat.comhttp://www.freeipa.org/page/CVE-2012-5484Vendor Advisory
secalert@redhat.comhttp://www.freeipa.org/page/Releases/3.1.2
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9
af854a3a-2127-422b-91ae-364da2661108http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0188.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0189.html
af854a3a-2127-422b-91ae-364da2661108http://www.freeipa.org/page/CVE-2012-5484Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.freeipa.org/page/Releases/3.1.2
Impacted products
Vendor Product Version
redhat freeipa 2.0.0
redhat freeipa 2.0.1
redhat freeipa 2.1.0
redhat freeipa 2.1.1
redhat freeipa 2.1.3
redhat freeipa 2.1.4
redhat freeipa 2.2.1
redhat freeipa 3.0.0
redhat freeipa 3.0.1
redhat freeipa 3.0.2
redhat freeipa 3.1.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61635E9E-FA0F-43DD-956D-6A65CC349DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8002A146-BC41-45D1-BDBE-13A99A83B81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A3C75F-9A29-43DA-99D9-A012E43C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7812FB3-207A-4A88-88B5-2413DE7F843B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D0A859-34B4-4A2B-9DDE-49224B6BE161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17AACA8-52EA-4A9D-A02C-4064E7056454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF167865-60B0-4350-B2F3-5AB037F1A3BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EC0B67-0A62-40DB-AB3D-47251D6A9A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4876ACC-1CF4-4674-8DD0-D64E028F5FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A987D93-5427-4954-8C6C-E7C295A09BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BED799E-F847-4FAD-8EE0-CAB1DA6C0558",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate."
    },
    {
      "lang": "es",
      "value": "El cliente FreeIPA v2.x y v3.x anterior a v3.1.2 no obtiene de forma adecuada el certificado Certification Authority (CA) del servidor, lo que permite ataques man-in-the-middle para falsear el procedimiento de conexi\u00f3n a trav\u00e9s de un certificado manipulado."
    }
  ],
  "id": "CVE-2012-5484",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-01-27T18:55:02.070",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0188.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0189.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.freeipa.org/page/CVE-2012-5484"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.freeipa.org/page/Releases/3.1.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=18eea90ebb24a9c22248f0b7e18646cc6e3e3e0f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=31e41eea6c2322689826e6065ceba82551c565aa"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=91f4af7e6af53e1c6bf17ed36cb2161863eddae4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a1991aeac19c3fec1fdd0d184c6760c90c9f9fc9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.fedorahosted.org/cgit/freeipa.git/commit/?id=a40285c5a0288669b72f9d991508d4405885bffc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0189.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.freeipa.org/page/CVE-2012-5484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.freeipa.org/page/Releases/3.1.2"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…