Upstream information
CVE-2019-14867 at MITRE
Description
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
CVSS v2 Scores
| CVSS detail | National Vulnerability Database |
| Base Score | 6.8 |
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| Access Vector | Network |
| Access Complexity | Medium |
| Authentication | None |
| Confidentiality Impact | Partial |
| Integrity Impact | Partial |
| Availability Impact | Partial |
CVSS v3 Scores
| CVSS detail | National Vulnerability Database |
| Base Score | 8.8 |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | Required |
| Scope | Unchanged |
| Confidentiality Impact | High |
| Integrity Impact | High |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) | Fixed package version(s) | References |
| SUSE Liberty Linux 7 | ipa-client >= 4.6.5-11.el7_7.4
ipa-client-common >= 4.6.5-11.el7_7.4
ipa-common >= 4.6.5-11.el7_7.4
ipa-python-compat >= 4.6.5-11.el7_7.4
ipa-server >= 4.6.5-11.el7_7.4
ipa-server-common >= 4.6.5-11.el7_7.4
ipa-server-dns >= 4.6.5-11.el7_7.4
ipa-server-trust-ad >= 4.6.5-11.el7_7.4
python2-ipaclient >= 4.6.5-11.el7_7.4
python2-ipalib >= 4.6.5-11.el7_7.4
python2-ipaserver >= 4.6.5-11.el7_7.4
| Patchnames: RHSA-2020:0378 |
| SUSE Liberty Linux 8 | bind-dyndb-ldap >= 11.1-14.module+el8.1.0+4098+f286395e
custodia >= 0.6.0-3.module+el8.1.0+4098+f286395e
ipa-client >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-client-common >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-client-samba >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-common >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-healthcheck >= 0.3-4.module+el8.1.0+4098+f286395e
ipa-idoverride-memberof-plugin >= 0.0.4-6.module+el8.1.0+4098+f286395e
ipa-python-compat >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-server >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-server-common >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-server-dns >= 4.8.0-13.module+el8.1.0+4923+c6efe041
ipa-server-trust-ad >= 4.8.0-13.module+el8.1.0+4923+c6efe041
opendnssec >= 1.4.14-1.module+el8.1.0+4098+f286395e
python3-custodia >= 0.6.0-3.module+el8.1.0+4098+f286395e
python3-ipaclient >= 4.8.0-13.module+el8.1.0+4923+c6efe041
python3-ipalib >= 4.8.0-13.module+el8.1.0+4923+c6efe041
python3-ipaserver >= 4.8.0-13.module+el8.1.0+4923+c6efe041
python3-jwcrypto >= 0.5.0-1.module+el8.1.0+4098+f286395e
python3-kdcproxy >= 0.4-3.module+el8.1.0+4098+f286395e
python3-pyusb >= 1.0.0-9.module+el8.1.0+4098+f286395e
python3-qrcode >= 5.1-12.module+el8.1.0+4098+f286395e
python3-qrcode-core >= 5.1-12.module+el8.1.0+4098+f286395e
python3-yubico >= 1.3.2-9.module+el8.1.0+4098+f286395e
slapi-nis >= 0.56.3-2.module+el8.1.0+4098+f286395e
softhsm >= 2.4.0-2.module+el8.1.0+4098+f286395e
softhsm-devel >= 2.4.0-2.module+el8.1.0+4098+f286395e
| Patchnames: RHBA-2019:4268 |
SUSE Timeline for this CVE
CVE page created: Wed Nov 27 07:39:12 2019
CVE page last modified: Thu Apr 16 13:52:15 2026