Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Important: ipa on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Thursday 24th January 2013 15:52:06 UTC (over 3 years ago)
Synopsis:          Important: ipa security update
Issue Date:        2013-01-23
CVE Numbers:       CVE-2012-5484
--

A weakness was found in the way IPA clients communicated with IPA 
servers when
initially attempting to join IPA domains. As there was no secure way to 
provide
the IPA server's Certificate Authority (CA) certificate to the client 
during a
join, the IPA client enrollment process was susceptible to
man-in-the-middle
attacks. This flaw could allow an attacker to obtain access to the IPA 
server
using the credentials provided by an IPA client, including administrative
access to the entire domain if the join was performed using an 
administrator's
credentials. (CVE-2012-5484)

Note: This weakness was only exposed during the initial client join to the
realm, because the IPA client did not yet have the CA certificate of the
server. Once an IPA client has joined the realm and has obtained the CA
certificate of the IPA server, all further communication is secure. If a 
client
were using the OTP (one-time password) method to join to the realm, an 
attacker
could only obtain unprivileged access to the server (enough to only join
the
realm).

This update must be installed on both the IPA client and IPA server. 
When this
update has been applied to the client but not the server, 
ipa-client-install,
in unattended mode, will fail if you do not have the correct CA certificate
locally, noting that you must use the "--force" option to insecurely 
obtain the
certificate. In interactive mode, the certificate will try to be obtained
securely from LDAP. If this fails, you will be prompted to insecurely 
download
the certificate via HTTP. In the same situation when using OTP, LDAP 
will not
be queried and you will be prompted to insecurely download the 
certificate via
HTTP.

After installing the update, changes in LDAP are handled by
ipa-ldap-updater
automatically and are effective immediately.
--

SL6
   x86_64
     ipa-client-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-debuginfo-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-python-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-admintools-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-server-2.2.0-17.el6_3.1.x86_64.rpm
     ipa-server-selinux-2.2.0-17.el6_3.1.x86_64.rpm
   i386
     ipa-client-2.2.0-17.el6_3.1.i686.rpm
     ipa-debuginfo-2.2.0-17.el6_3.1.i686.rpm
     ipa-python-2.2.0-17.el6_3.1.i686.rpm
     ipa-admintools-2.2.0-17.el6_3.1.i686.rpm
     ipa-server-2.2.0-17.el6_3.1.i686.rpm
     ipa-server-selinux-2.2.0-17.el6_3.1.i686.rpm

For dependency resolution the following packages have been added to the SL5
security repo on some older releases:
   x86_64
     certmonger-0.56-1.el6.x86_64.rpm
     libipa_hbac-1.8.0-32.el6.i686.rpm
     libipa_hbac-1.8.0-32.el6.x86_64.rpm
     libipa_hbac-devel-1.8.0-32.el6.i686.rpm
     libipa_hbac-devel-1.8.0-32.el6.x86_64.rpm
     libipa_hbac-python-1.8.0-32.el6.x86_64.rpm
     libsss_autofs-1.8.0-32.el6.x86_64.rpm
     mod_auth_kerb-5.4-9.el6.x86_64.rpm
     pki-ca-9.0.3-24.el6.noarch.rpm
     pki-common-9.0.3-24.el6.noarch.rpm
     pki-common-javadoc-9.0.3-24.el6.noarch.rpm
     pki-java-tools-9.0.3-24.el6.noarch.rpm
     pki-java-tools-javadoc-9.0.3-24.el6.noarch.rpm
     pki-native-tools-9.0.3-24.el6.x86_64.rpm
     pki-selinux-9.0.3-24.el6.noarch.rpm
     pki-setup-9.0.3-24.el6.noarch.rpm
     pki-silent-9.0.3-24.el6.noarch.rpm
     pki-symkey-9.0.3-24.el6.x86_64.rpm
     pki-util-9.0.3-24.el6.noarch.rpm
     pki-util-javadoc-9.0.3-24.el6.noarch.rpm
     python-memcached-1.43-6.el6.noarch.rpm
     slapi-nis-0.40-1.el6.x86_64.rpm
     sssd-1.8.0-32.el6.x86_64.rpm
     sssd-client-1.8.0-32.el6.i686.rpm
     sssd-client-1.8.0-32.el6.x86_64.rpm
     sssd-tools-1.8.0-32.el6.x86_64.rpm
   i386
     certmonger-0.56-1.el6.i686.rpm
     libipa_hbac-1.8.0-32.el6.i686.rpm
     libipa_hbac-devel-1.8.0-32.el6.i686.rpm
     libipa_hbac-python-1.8.0-32.el6.i686.rpm
     libsss_autofs-1.8.0-32.el6.i686.rpm
     mod_auth_kerb-5.4-9.el6.i686.rpm
     pki-ca-9.0.3-24.el6.noarch.rpm
     pki-common-9.0.3-24.el6.noarch.rpm
     pki-common-javadoc-9.0.3-24.el6.noarch.rpm
     pki-java-tools-9.0.3-24.el6.noarch.rpm
     pki-java-tools-javadoc-9.0.3-24.el6.noarch.rpm
     pki-native-tools-9.0.3-24.el6.i686.rpm
     pki-selinux-9.0.3-24.el6.noarch.rpm
     pki-setup-9.0.3-24.el6.noarch.rpm
     pki-silent-9.0.3-24.el6.noarch.rpm
     pki-symkey-9.0.3-24.el6.i686.rpm
     pki-util-9.0.3-24.el6.noarch.rpm
     pki-util-javadoc-9.0.3-24.el6.noarch.rpm
     python-memcached-1.43-6.el6.noarch.rpm
     slapi-nis-0.40-1.el6.i686.rpm
     sssd-1.8.0-32.el6.i686.rpm
     sssd-client-1.8.0-32.el6.i686.rpm
     sssd-tools-1.8.0-32.el6.i686.rpm

- Scientific Linux Development Team
 
CD: 2ms