CVE-2020-1722

CVE Details

Release Date:2020-04-27

Description


A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.

See more information about CVE-2020-1722 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.3 Base Metrics: AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Access Vector: Network Attack Complexity: High
Privileges Required: None User Interaction: Required
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: None Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (ipa)ELSA-2020-39362020-10-06
Oracle Linux version 8 (bind-dyndb-ldap)ELSA-2020-46702020-11-10
Oracle Linux version 8 (custodia)ELSA-2020-46702020-11-10
Oracle Linux version 8 (ipa)ELSA-2020-46702020-11-10
Oracle Linux version 8 (ipa-healthcheck)ELSA-2020-46702020-11-10
Oracle Linux version 8 (opendnssec)ELSA-2020-46702020-11-10
Oracle Linux version 8 (python-jwcrypto)ELSA-2020-46702020-11-10
Oracle Linux version 8 (python-kdcproxy)ELSA-2020-46702020-11-10
Oracle Linux version 8 (python-qrcode)ELSA-2020-46702020-11-10
Oracle Linux version 8 (python-yubico)ELSA-2020-46702020-11-10
Oracle Linux version 8 (pyusb)ELSA-2020-46702020-11-10
Oracle Linux version 8 (slapi-nis)ELSA-2020-46702020-11-10
Oracle Linux version 8 (softhsm)ELSA-2020-46702020-11-10



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete