CVE-2014-7828 (retired)

Priority
Description
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled,
allows remote attackers to bypass the password requirement of the
two-factor authentication leveraging an enabled OTP token, which triggers
an anonymous bind.
Notes
 ebarretto> This is a FreeIPA 4.0.x issue, so marking Trusty as not affected
 ebarretto> Although Trusty also has the code, it differs from 4.0.x version
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.0.5-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.0.5-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (4.0.5-1)
Ubuntu 19.04 (Disco Dingo):not-affected (4.0.5-1)
Patches:
Upstream:https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html
More Information

Updated: 2019-03-26 12:13:34 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)