Rapid7 Vulnerability & Exploit Database

RHSA-2009:0006: rhpki security and bug fix update

Back to Search

RHSA-2009:0006: rhpki security and bug fix update

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
01/20/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

Updated pkisetup, rhpki-common, rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks, and rhpki-tps (and rhpki-util for Solaris 9) packages that fix various security issues and several bugs are now available for Red Hat Certificate System 7.2. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Red Hat Certificate System is an enterprise software system designed to manage enterprise public key infrastructure (PKI) deployments. It was discovered that Red Hat Certificate System used insecure default file permissions on certain configuration files (for example, password.conf) that may contain authentication credentials. These credentials should only be accessible to administrative and service users. A local user could use this flaw to read Red Hat Certificate System configuration files containing sensitive information. (CVE-2008-2367) It was discovered that Red Hat Certificate System stored plain text passwords in multiple debug log files with insufficient access restrictions (such as the UserDirEnrollment log and RA wizard installer log). A local user could use this flaw to extract plain text passwords from the Red Hat Certificate System debug log files. (CVE-2008-2368) These updated packages fix the following bugs: * Due to a regression, signing a certificate revocation list (CRL) with approximately 150,000 records may have taken up to five minutes. In these updated packages, signing such CRLs takes approximately twenty seconds. * Because Certificate System servers could not handle Online Certificate Status Protocol (OCSP) requests in the GET method, OCSP GET requests resulted in a 404 error. The bug for handling GET requests may have also caused a system to use 100% CPU. This has been resolved. Additionally, OCSP requests are now logged to the debug log file. * It was possible for a CRL update to run at the same time as a certificate status update. Now, CRL updating locks out the certificate status update thread. * Inefficient LDAP search methods caused LDAP searches for 100,000 or more revoked certificates to take twenty minutes or longer during CRL generation. The LDAP search method has been modified to greatly improve LDAP search times. * The default OCSP verification path has changed since Red Hat Certificate System 7.1. These updated packages add support for certificates that use the old AuthorityInfoAccess (AIA) URL. * An OCSP client submitting an OCSP request via the GET method may have caused a NullPointerException. * If an agent automatically approved a certificate signing request (CSR), using AgentCertAuth, the resultant certificate contained blank subjectAltName extension fields. A manual enrollment by the same agent produced a certificate with the correct number of subjectAltNames and no blank entries. With this update, automated enrollments through AgentCertAuth do not have blank fields in issued certificates. All users of Red Hat Certificate System 7.2 should upgrade to these updated packages, which resolve these issues.

Solution(s)

  • redhat-upgrade-pkisetup
  • redhat-upgrade-rhpki-ca
  • redhat-upgrade-rhpki-common
  • redhat-upgrade-rhpki-kra
  • redhat-upgrade-rhpki-ocsp
  • redhat-upgrade-rhpki-tks
  • redhat-upgrade-rhpki-tps

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;