| Revision Date: | 2018-09-18 | Version: | 1 | | Title: | CVE-2012-5631 on Ubuntu 16.04 LTS (xenial) - untriaged. | | Description: | In IPA version 3.0 the session cookie optimization was added to the IPA command line client (/usr/bin/ipa) which uses XMLRPC to connect to the IPA server and perform the same operations available in the browser based web UI of IPA. Unfortunately the command line client failed to observe the same rules for cookie security that browsers implement. Specifically it failed to check it was sending the session id in the cookie to the same URL the session id was received on a secure transport connection.
| | Family: | unix | Class: | vulnerability | | Status: | | Reference(s): | CVE-2012-5631
| | Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | | Definition Synopsis | | Ubuntu 16.04 LTS (xenial) is installed. AND NOT While related to the CVE in some way, the 'freeipa' package in xenial is not affected.
|
|