A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Weaknesses in this category are related to improper assignment or handling of permissions.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96557 | third party advisory vdb entry |
http://rhn.redhat.com/errata/RHSA-2017-0388.html | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2590 | patch issue tracking |