Описание
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| freeipa | fixed | 4.4.4-1 | package |
Примечания
https://bugzilla.redhat.com/show_bug.cgi?id=1370493
https://fedorahosted.org/freeipa/ticket/6561
Upstream patch: https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=6f1d92746
Additional dependency: https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=73f33569c
EPSS
Связанные уязвимости
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
EPSS