Логотип exploitDog
bind:"BDU:2024-06544" OR bind:"CVE-2024-3183"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-06544" OR bind:"CVE-2024-3183"

Количество 11

Количество 11

redos логотип

ROS-20240918-08

9 месяцев назад

Уязвимость ipa-server

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2024-06544

около 1 года назад

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с недостаточным вычислением хэша пароля, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.1
EPSS: Низкий
ubuntu логотип

CVE-2024-3183

около 1 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2024-3183

около 1 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2024-3183

около 1 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2024-3183

около 1 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-8g25-xmmm-86qm

около 1 года назад

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
EPSS: Низкий
oracle-oval логотип

ELSA-2024-3760

около 1 года назад

ELSA-2024-3760: ipa security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:3754

около 1 года назад

Important: ipa security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3755

около 1 года назад

ELSA-2024-3755: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3754

около 1 года назад

ELSA-2024-3754: ipa security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20240918-08

Уязвимость ipa-server

CVSS3: 8.1
6%
Низкий
9 месяцев назад
fstec логотип
BDU:2024-06544

Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с недостаточным вычислением хэша пароля, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.1
6%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
6%
Низкий
около 1 года назад
redhat логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
6%
Низкий
около 1 года назад
nvd логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
6%
Низкий
около 1 года назад
debian логотип
CVE-2024-3183

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ ...

CVSS3: 8.1
6%
Низкий
около 1 года назад
github логотип
GHSA-8g25-xmmm-86qm

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).

CVSS3: 8.1
6%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-3760

ELSA-2024-3760: ipa security update (IMPORTANT)

около 1 года назад
rocky логотип
RLSA-2024:3754

Important: ipa security update

около 1 года назад
oracle-oval логотип
ELSA-2024-3755

ELSA-2024-3755: idm:DL1 security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-3754

ELSA-2024-3754: ipa security update (IMPORTANT)

около 1 года назад

Уязвимостей на страницу