| Revision Date: | 2018-09-18 | Version: | 1 | | Title: | CVE-2012-5631 on Ubuntu 16.04 LTS (xenial) - untriaged. | | Description: | In IPA version 3.0 the session cookie optimization was added to the IPA command line client (/usr/bin/ipa) which uses XMLRPC to connect to the IPA server and perform the same operations available in the browser based web UI of IPA. Unfortunately the command line client failed to observe the same rules for cookie security that browsers implement. Specifically it failed to check it was sending the session id in the cookie to the same URL the session id was received on a secure transport connection.
| | Family: | unix | Class: | vulnerability | | Status: | | Reference(s): | CVE-2012-5631
| | Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | | Definition Synopsis | | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT freeipa-admintools package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-client package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-common package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-server package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-server-dns package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-server-trust-ad package in xenial, while related to the CVE in some way, is not affected.
OR NOT freeipa-tests package in xenial, while related to the CVE in some way, is not affected.
OR NOT python-ipaclient package in xenial, while related to the CVE in some way, is not affected.
OR NOT python-ipalib package in xenial, while related to the CVE in some way, is not affected.
OR NOT python-ipaserver package in xenial, while related to the CVE in some way, is not affected.
OR NOT python-ipatests package in xenial, while related to the CVE in some way, is not affected.
|
|