Bug 1205751
Summary: | realmd: unauthenticated Active Directory join | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | carnil, ebenes, jhrozek, pkis, stefw | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: |
It was found that the realm client would try to automatically join an active directory domain without authentication, which could potentially lead to privilege escalation within a specified domain.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2015-11-20 05:59:41 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1205753, 1205754, 1233011 | ||||||
Bug Blocks: | 1205773 | ||||||
Attachments: |
|
Description
Vasyl Kaigorodov
2015-03-25 14:59:22 UTC
Created realmd tracking bugs for this issue: Affects: fedora-all [bug 1205753] Created attachment 1014277 [details]
Disable Automatic AD Jains
Combined patch for this issue.
Note: MITRE does not intend to assign a cve id to it, because it seems to be accepted, intentional behaviour. Red Hat Product Security Team intends to handle this flaw as a hardening fix. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2184 https://rhn.redhat.com/errata/RHSA-2015-2184.html |