CVE-2017-12197

Impact:
Moderate
Public Date:
2017-10-17
CWE:
CWE-863
Bugzilla:
1503103: CVE-2017-12197 libpam4j: Account check bypass
It was found that libpam4j did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.

Find out more about CVE-2017-12197 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 4.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Single Sign-On 7.1 for RHEL 6 Server (rh-sso7-keycloak) RHSA-2017:2904 2017-10-17
Red Hat Single Sign-On 7.1 RHSA-2017:2906 2017-10-17
Red Hat Single Sign-On 7.1 for RHEL 7 Server (rh-sso7-keycloak) RHSA-2017:2905 2017-10-17

Affected Packages State

Platform Package State
Red Hat Single Sign-On 7 keycloak-sssd-federation Will not fix

Acknowledgements

This issue was discovered by Christian Heimes (Red Hat).

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.