Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-9189

Опубликовано: 07 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2025-9189: ipa security update (IMPORTANT)

[4.6.8-5.0.3.el7_9.17]

  • Fix privilege escalation from host to domain vulnerability
  • CVE-2025-4404 [Orabug: 38085890]

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

ipa-client

4.6.8-5.0.3.el7_9.17

ipa-client-common

4.6.8-5.0.3.el7_9.17

ipa-common

4.6.8-5.0.3.el7_9.17

ipa-python-compat

4.6.8-5.0.3.el7_9.17

ipa-server

4.6.8-5.0.3.el7_9.17

ipa-server-common

4.6.8-5.0.3.el7_9.17

ipa-server-dns

4.6.8-5.0.3.el7_9.17

ipa-server-trust-ad

4.6.8-5.0.3.el7_9.17

python2-ipaclient

4.6.8-5.0.3.el7_9.17

python2-ipalib

4.6.8-5.0.3.el7_9.17

python2-ipaserver

4.6.8-5.0.3.el7_9.17

Связанные CVE

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
redhat
около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
nvd
около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
debian
около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in ...

CVSS3: 9.1
github
около 2 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.