Логотип exploitDog
bind:"GHSA-8g25-xmmm-86qm" OR bind:"CVE-2024-3183"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-8g25-xmmm-86qm" OR bind:"CVE-2024-3183"

Количество 12

Количество 12

github логотип

GHSA-8g25-xmmm-86qm

почти 2 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Средний
ubuntu логотип

CVE-2024-3183

почти 2 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Средний
redhat логотип

CVE-2024-3183

почти 2 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Средний
nvd логотип

CVE-2024-3183

почти 2 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Средний
debian логотип

CVE-2024-3183

почти 2 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ ...

CVSS3: 8.1
EPSS: Средний
oracle-oval логотип

ELSA-2024-3760

почти 2 года назад

ELSA-2024-3760: ipa security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20240918-08

больше 1 года назад

Уязвимость ipa-server

CVSS3: 8.1
EPSS: Средний
rocky логотип

RLSA-2024:3755

почти 2 года назад

Important: idm:DL1 security update

EPSS: Низкий
rocky логотип

RLSA-2024:3754

почти 2 года назад

Important: ipa security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3755

почти 2 года назад

ELSA-2024-3755: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3754

почти 2 года назад

ELSA-2024-3754: ipa security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-06544

почти 2 года назад

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с недостаточным вычислением хэша пароля, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.1
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-8g25-xmmm-86qm

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
21%
Средний
почти 2 года назад
ubuntu логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
21%
Средний
почти 2 года назад
redhat логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
21%
Средний
почти 2 года назад
nvd логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
21%
Средний
почти 2 года назад
debian логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ ...

CVSS3: 8.1
21%
Средний
почти 2 года назад
oracle-oval логотип
ELSA-2024-3760

ELSA-2024-3760: ipa security update (IMPORTANT)

почти 2 года назад
redos логотип
ROS-20240918-08

Уязвимость ipa-server

CVSS3: 8.1
21%
Средний
больше 1 года назад
rocky логотип
RLSA-2024:3755

Important: idm:DL1 security update

почти 2 года назад
rocky логотип
RLSA-2024:3754

Important: ipa security update

почти 2 года назад
oracle-oval логотип
ELSA-2024-3755

ELSA-2024-3755: idm:DL1 security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2024-3754

ELSA-2024-3754: ipa security update (IMPORTANT)

почти 2 года назад
fstec логотип
BDU:2024-06544

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с недостаточным вычислением хэша пароля, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.1
21%
Средний
почти 2 года назад

Уязвимостей на страницу