Описание
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 4.4.4-1 |
| cosmic | not-affected | 4.4.4-1 |
| devel | not-affected | 4.4.4-1 |
| disco | not-affected | 4.4.4-1 |
| eoan | not-affected | 4.4.4-1 |
| esm-apps/bionic | not-affected | 4.4.4-1 |
| esm-apps/focal | not-affected | 4.4.4-1 |
| esm-apps/jammy | not-affected | 4.4.4-1 |
| esm-apps/xenial | released | 4.3.1-0ubuntu1+esm1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
FreeIPA uses a default password policy that locks an account after 5 u ...
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3