The client in FreeIPA 2.x and 3.x prior to 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle malicious users to spoof a join procedure via a crafted certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat freeipa 2.0.0 |
||
redhat freeipa 2.1.0 |
||
redhat freeipa 2.0.1 |
||
redhat freeipa 2.2.1 |
||
redhat freeipa 2.1.4 |
||
redhat freeipa 2.1.3 |
||
redhat freeipa 2.1.1 |
||
redhat freeipa 3.1.1 |
||
redhat freeipa 3.0.2 |
||
redhat freeipa 3.0.1 |
||
redhat freeipa 3.0.0 |