6.3
CVSSv3

CVE-2016-9575

Published: 13/03/2018 Updated: 09/10/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 6.3 | Impact Score: 3.4 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Ipa versions 4.2.x, 4.3.x prior to 4.3.3 and 4.4.x prior to 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

freeipa freeipa 4.2.0

freeipa freeipa 4.4.0

freeipa freeipa 4.4.1

freeipa freeipa 4.4.2

freeipa freeipa 4.3.1

freeipa freeipa 4.2.1

freeipa freeipa 4.2.2

freeipa freeipa 4.2.3

freeipa freeipa 4.2.4

freeipa freeipa 4.3.0

freeipa freeipa 4.3.2

Vendor Advisories

Synopsis Moderate: ipa security update Type/Severity Security Advisory: Moderate Topic An update for ipa is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which give ...
Debian Bug report logs - #849950 freeipa: CVE-2016-9575: Insufficient permission check in certprofile-mod Package: src:freeipa; Maintainer for src:freeipa is Debian FreeIPA Team <pkg-freeipa-devel@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 2 Jan 2017 15:48:01 UTC Sever ...
It was found that IdM's certprofile-mod command did not properly check the user's permissions while modifying certificate profiles An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks ...