CVE Vulnerabilities

CVE-2008-5082

Improper Authentication

Published: Jan 30, 2009 | Modified: Aug 08, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The verifyProof function in the Token Processing System (TPS) component in Red Hat Certificate System (RHCS) 7.1 through 7.3 and Dogtag Certificate System 1.0 returns successfully even when token enrollment did not use the hardware key, which allows remote authenticated users with enrollment privileges to bypass intended authentication policies by performing enrollment with a software key.

Weakness

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
_dogtag_certificate_system Redhat 1.0 1.0
Certificate_system Redhat 7.1 7.1
Certificate_system Redhat 7.2 7.2
Certificate_system Redhat 7.3 7.3
Red Hat Certificate System 7.3 RedHat pkisetup-0:7.3.0-14.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-ca-0:7.3.0-17.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-common-0:7.3.0-40.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-kra-0:7.3.0-13.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-ocsp-0:7.3.0-11.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-ra-0:7.3.0-67.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-tks-0:7.3.0-12.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-tps-0:7.3.0-23.el4 *
Red Hat Certificate System 7.3 RedHat rhpki-util-0:7.3.0-20.el4 *

Potential Mitigations

References