DEBIAN-CVE-2017-12169

Source
https://security-tracker.debian.org/tracker/CVE-2017-12169
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-12169.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-12169
Upstream
Published
2018-01-10T15:29:00.237Z
Modified
2026-01-24T17:16:57.539744Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.

References

Affected packages

Debian:12 / freeipa

Package

Name
freeipa
Purl
pkg:deb/debian/freeipa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.11-1
4.9.11-1+exp1
4.9.11-2
4.10.1-1+exp1
4.10.1+dfsg1-1+exp1
4.10.2-1
4.10.2-2
4.10.2-2+exp1
4.11.1-1
4.11.1-1+exp1
4.11.1-2
4.11.1-2+exp1
4.11.1-2.1
4.12.2-1
4.12.2-2
4.12.2-3
4.12.4-1
4.12.4-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-12169.json"

Debian:13 / freeipa

Package

Name
freeipa
Purl
pkg:deb/debian/freeipa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.12.4-1
4.12.4-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-12169.json"