Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0189 - Security Advisory
Issued:
2013-01-23
Updated:
2013-01-23

RHSA-2013:0189 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: ipa-client security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated ipa-client package that fixes one security issue is now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

Red Hat Identity Management is a centralized authentication, identity
management and authorization solution for both traditional and cloud-based
enterprise environments.

A weakness was found in the way IPA clients communicated with IPA servers
when initially attempting to join IPA domains. As there was no secure way
to provide the IPA server's Certificate Authority (CA) certificate to the
client during a join, the IPA client enrollment process was susceptible to
man-in-the-middle attacks. This flaw could allow an attacker to obtain
access to the IPA server using the credentials provided by an IPA client,
including administrative access to the entire domain if the join was
performed using an administrator's credentials. (CVE-2012-5484)

Note: This weakness was only exposed during the initial client join to the
realm, because the IPA client did not yet have the CA certificate of the
server. Once an IPA client has joined the realm and has obtained the CA
certificate of the IPA server, all further communication is secure. If a
client were using the OTP (one-time password) method to join to the realm,
an attacker could only obtain unprivileged access to the server (enough to
only join the realm).

Red Hat would like to thank Petr Mensik for reporting this issue.

When a fix for this flaw has been applied to the client but not yet the
server, ipa-client-install, in unattended mode, will fail if you do not
have the correct CA certificate locally, noting that you must use the
"--force" option to insecurely obtain the certificate. In interactive mode,
the certificate will try to be obtained securely from LDAP. If this fails,
you will be prompted to insecurely download the certificate via HTTP. In
the same situation when using OTP, LDAP will not be queried and you will be
prompted to insecurely download the certificate via HTTP.

Users of ipa-client are advised to upgrade to this updated package, which
corrects this issue.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386

Fixes

  • BZ - 876307 - CVE-2012-5484 ipa: weakness when initiating join from IPA client can potentially compromise IPA domain

CVEs

  • CVE-2012-5484

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
ia64
ipa-client-2.1.3-5.el5_9.2.ia64.rpm SHA-256: 198875c89657cc204b6cc59a4b53254c7adeba7e741da9ec0c4e5bf3f3384711
ipa-client-debuginfo-2.1.3-5.el5_9.2.ia64.rpm SHA-256: ce108d427ef4ff32cc827f288d0492b75fa4e6ce8b7c42bdd6ed4e70e15d591d
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
ia64
ipa-client-2.1.3-5.el5_9.2.ia64.rpm SHA-256: 198875c89657cc204b6cc59a4b53254c7adeba7e741da9ec0c4e5bf3f3384711
ipa-client-debuginfo-2.1.3-5.el5_9.2.ia64.rpm SHA-256: ce108d427ef4ff32cc827f288d0492b75fa4e6ce8b7c42bdd6ed4e70e15d591d
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux Server from RHUI 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
ia64
ipa-client-2.1.3-5.el5_9.2.ia64.rpm SHA-256: 198875c89657cc204b6cc59a4b53254c7adeba7e741da9ec0c4e5bf3f3384711
ipa-client-debuginfo-2.1.3-5.el5_9.2.ia64.rpm SHA-256: ce108d427ef4ff32cc827f288d0492b75fa4e6ce8b7c42bdd6ed4e70e15d591d
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux Workstation 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux Desktop 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
s390x
ipa-client-2.1.3-5.el5_9.2.s390x.rpm SHA-256: 42a3811ae20e29513d3c10242f1e6165940ee10de31b96776c1a5e95c16b6e0a
ipa-client-debuginfo-2.1.3-5.el5_9.2.s390x.rpm SHA-256: 0cdc572a23c7fca028f7e99c31c8fa070ccbcf07d1f13a0bbef6f37509c74f49

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
s390x
ipa-client-2.1.3-5.el5_9.2.s390x.rpm SHA-256: 42a3811ae20e29513d3c10242f1e6165940ee10de31b96776c1a5e95c16b6e0a
ipa-client-debuginfo-2.1.3-5.el5_9.2.s390x.rpm SHA-256: 0cdc572a23c7fca028f7e99c31c8fa070ccbcf07d1f13a0bbef6f37509c74f49

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
ppc
ipa-client-2.1.3-5.el5_9.2.ppc.rpm SHA-256: 4fc3c07fcf6221f25bc74f7e20b0f1d6d703cd43bd729c0bdbc607465bc34339
ipa-client-debuginfo-2.1.3-5.el5_9.2.ppc.rpm SHA-256: dc43358c31f17dcbf31dfeeaaed48e7601fd9e7497d435d56dc5ebf617a74819

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
ppc
ipa-client-2.1.3-5.el5_9.2.ppc.rpm SHA-256: 4fc3c07fcf6221f25bc74f7e20b0f1d6d703cd43bd729c0bdbc607465bc34339
ipa-client-debuginfo-2.1.3-5.el5_9.2.ppc.rpm SHA-256: dc43358c31f17dcbf31dfeeaaed48e7601fd9e7497d435d56dc5ebf617a74819

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
ipa-client-2.1.3-5.el5_9.2.src.rpm SHA-256: d5c07abe06b441963f3f229934560b01a926eeab990f06a3caeabc2c1b7d1ef7
x86_64
ipa-client-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: e735217a2fe3c2529e1d3de4b14206d5fa9eba5f576bb0728aad4ab54bbc5efe
ipa-client-debuginfo-2.1.3-5.el5_9.2.x86_64.rpm SHA-256: d562a765fe0f29987a9d14aaabbea85e76c6bdfb7ea8899d13a2a03fa0e53846
i386
ipa-client-2.1.3-5.el5_9.2.i386.rpm SHA-256: 238acc71643a49b47906db7346cde3cdf1168db37b2c7ecad6aeba7a10771381
ipa-client-debuginfo-2.1.3-5.el5_9.2.i386.rpm SHA-256: dcc3eee3a06a4841700d354b105228c64205f475ae93a295e25c73c35285ecae

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility