Bug 648882 (CVE-2010-3868) - CVE-2010-3868 Certificate System: unauthenticated user can request SCEP one-time PIN decryption
Summary: CVE-2010-3868 Certificate System: unauthenticated user can request SCEP one-t...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-3868
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 471318 609327 609328 621350
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-11-02 12:33 UTC by Tomas Hoger
Modified: 2019-09-29 12:40 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-11-09 07:58:17 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0837 0 normal SHIPPED_LIVE Moderate: rhpki security and enhancement update 2010-11-08 20:06:51 UTC
Red Hat Product Errata RHSA-2010:0838 0 normal SHIPPED_LIVE Moderate: pki security and enhancement update 2010-11-08 20:12:18 UTC

Description Tomas Hoger 2010-11-02 12:33:49 UTC
Red Hat / Dogtag Certificate System's Certificate Authority can be asked to decrypt one-time PIN used in the SCEP (Simple Certificate Enrollment Protocol) protocol requests.  This feature is intended to be used by Registration Authorities that act as proxies between CA users (e.g. network devices enrolling using SCEP protocol) and CA itself.  However, Red Hat Certificate System lacked proper authentication mechanisms to ensure such decryption requests are only replied if sent form the configured Registration Authority.  An attacker able to sniff SCEP request of the network could use this flaw to request decryption of the sniffed request and obtain one-time PIN.

Red Hat Certificate System updates add proper authentication, only configured authenticated Registration Authorities can request SCEP one-time PIN decryption.

Comment 1 errata-xmlrpc 2010-11-08 20:06:56 UTC
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0837 https://rhn.redhat.com/errata/RHSA-2010-0837.html

Comment 2 errata-xmlrpc 2010-11-08 20:12:22 UTC
This issue has been addressed in following products:

  Red Hat Certificate System 8

Via RHSA-2010:0838 https://rhn.redhat.com/errata/RHSA-2010-0838.html

Comment 3 Tomas Hoger 2010-11-09 13:46:18 UTC
https://fedorahosted.org/pki/changeset/1261


Note You need to log in before you can comment on or make changes to this bug.