SCIENTIFIC-LINUX-ERRATA Archives

January 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 24 Jan 2013 09:52:06 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (121 lines)
Synopsis:          Important: ipa security update
Issue Date:        2013-01-23
CVE Numbers:       CVE-2012-5484
--

A weakness was found in the way IPA clients communicated with IPA 
servers when
initially attempting to join IPA domains. As there was no secure way to 
provide
the IPA server's Certificate Authority (CA) certificate to the client 
during a
join, the IPA client enrollment process was susceptible to man-in-the-middle
attacks. This flaw could allow an attacker to obtain access to the IPA 
server
using the credentials provided by an IPA client, including administrative
access to the entire domain if the join was performed using an 
administrator's
credentials. (CVE-2012-5484)

Note: This weakness was only exposed during the initial client join to the
realm, because the IPA client did not yet have the CA certificate of the
server. Once an IPA client has joined the realm and has obtained the CA
certificate of the IPA server, all further communication is secure. If a 
client
were using the OTP (one-time password) method to join to the realm, an 
attacker
could only obtain unprivileged access to the server (enough to only join the
realm).

This update must be installed on both the IPA client and IPA server. 
When this
update has been applied to the client but not the server, 
ipa-client-install,
in unattended mode, will fail if you do not have the correct CA certificate
locally, noting that you must use the "--force" option to insecurely 
obtain the
certificate. In interactive mode, the certificate will try to be obtained
securely from LDAP. If this fails, you will be prompted to insecurely 
download
the certificate via HTTP. In the same situation when using OTP, LDAP 
will not
be queried and you will be prompted to insecurely download the 
certificate via
HTTP.

After installing the update, changes in LDAP are handled by ipa-ldap-updater
automatically and are effective immediately.
--

SL6
   x86_64
     ipa-client-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-debuginfo-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-python-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-admintools-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-server-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-server-selinux-2.2.0-17.el6_3.1.x86_64.rpm
   i386
     ipa-client-2.2.0-17.el6_3.1.i686.rpm
     ipa-debuginfo-2.2.0-17.el6_3.1.i686.rpm
     ipa-python-2.2.0-17.el6_3.1.i686.rpm
     ipa-admintools-2.2.0-17.el6_3.1.i686.rpm
     ipa-server-2.2.0-17.el6_3.1.i686.rpm
     ipa-server-selinux-2.2.0-17.el6_3.1.i686.rpm

For dependency resolution the following packages have been added to the SL5
security repo on some older releases:
   x86_64
     certmonger-0.56-1.el6.x86_64.rpm
     libipa_hbac-1.8.0-32.el6.i686.rpm
     libipa_hbac-1.8.0-32.el6.x86_64.rpm
     libipa_hbac-devel-1.8.0-32.el6.i686.rpm
     libipa_hbac-devel-1.8.0-32.el6.x86_64.rpm
     libipa_hbac-python-1.8.0-32.el6.x86_64.rpm
     libsss_autofs-1.8.0-32.el6.x86_64.rpm
     mod_auth_kerb-5.4-9.el6.x86_64.rpm
     pki-ca-9.0.3-24.el6.noarch.rpm
     pki-common-9.0.3-24.el6.noarch.rpm
     pki-common-javadoc-9.0.3-24.el6.noarch.rpm
     pki-java-tools-9.0.3-24.el6.noarch.rpm
     pki-java-tools-javadoc-9.0.3-24.el6.noarch.rpm
     pki-native-tools-9.0.3-24.el6.x86_64.rpm
     pki-selinux-9.0.3-24.el6.noarch.rpm
     pki-setup-9.0.3-24.el6.noarch.rpm
     pki-silent-9.0.3-24.el6.noarch.rpm
     pki-symkey-9.0.3-24.el6.x86_64.rpm
     pki-util-9.0.3-24.el6.noarch.rpm
     pki-util-javadoc-9.0.3-24.el6.noarch.rpm
     python-memcached-1.43-6.el6.noarch.rpm
     slapi-nis-0.40-1.el6.x86_64.rpm
     sssd-1.8.0-32.el6.x86_64.rpm
     sssd-client-1.8.0-32.el6.i686.rpm
     sssd-client-1.8.0-32.el6.x86_64.rpm
     sssd-tools-1.8.0-32.el6.x86_64.rpm
   i386
     certmonger-0.56-1.el6.i686.rpm
     libipa_hbac-1.8.0-32.el6.i686.rpm
     libipa_hbac-devel-1.8.0-32.el6.i686.rpm
     libipa_hbac-python-1.8.0-32.el6.i686.rpm
     libsss_autofs-1.8.0-32.el6.i686.rpm
     mod_auth_kerb-5.4-9.el6.i686.rpm
     pki-ca-9.0.3-24.el6.noarch.rpm
     pki-common-9.0.3-24.el6.noarch.rpm
     pki-common-javadoc-9.0.3-24.el6.noarch.rpm
     pki-java-tools-9.0.3-24.el6.noarch.rpm
     pki-java-tools-javadoc-9.0.3-24.el6.noarch.rpm
     pki-native-tools-9.0.3-24.el6.i686.rpm
     pki-selinux-9.0.3-24.el6.noarch.rpm
     pki-setup-9.0.3-24.el6.noarch.rpm
     pki-silent-9.0.3-24.el6.noarch.rpm
     pki-symkey-9.0.3-24.el6.i686.rpm
     pki-util-9.0.3-24.el6.noarch.rpm
     pki-util-javadoc-9.0.3-24.el6.noarch.rpm
     python-memcached-1.43-6.el6.noarch.rpm
     slapi-nis-0.40-1.el6.i686.rpm
     sssd-1.8.0-32.el6.i686.rpm
     sssd-client-1.8.0-32.el6.i686.rpm
     sssd-tools-1.8.0-32.el6.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2