The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification Authority (CA) certificate from the server, which allows man-in-the-middle attackers to spoof a join procedure via a crafted certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeipa | Redhat | 2.0.0 (including) | 2.0.0 (including) |
Freeipa | Redhat | 2.0.1 (including) | 2.0.1 (including) |
Freeipa | Redhat | 2.1.0 (including) | 2.1.0 (including) |
Freeipa | Redhat | 2.1.1 (including) | 2.1.1 (including) |
Freeipa | Redhat | 2.1.3 (including) | 2.1.3 (including) |
Freeipa | Redhat | 2.1.4 (including) | 2.1.4 (including) |
Freeipa | Redhat | 2.2.1 (including) | 2.2.1 (including) |
Red Hat Enterprise Linux 5 | RedHat | ipa-client-0:2.1.3-5.el5_9.2 | * |
Red Hat Enterprise Linux 6 | RedHat | ipa-0:2.2.0-17.el6_3.1 | * |
Freeipa | Ubuntu | precise | * |
Freeipa | Ubuntu | quantal | * |
Freeipa | Ubuntu | upstream | * |