CVE-2022-2393

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2393
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2393.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2393
Related
Published
2022-07-14T15:15:08Z
Modified
2024-09-18T03:20:16.013940Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.

References

Affected packages

Debian:11 / dogtag-pki

Package

Name
dogtag-pki
Purl
pkg:deb/debian/dogtag-pki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.10.2-3
10.10.6-1

11.*

11.0.0-1
11.0.3-1
11.0.3-2
11.0.3-3
11.0.3-4
11.0.6-1
11.0.6-2
11.2.1-1
11.2.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}