Scientific Linux Security Update : ipa on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Two cross-site scripting (XSS) flaws were found in jQuery, which
impacted the Identity Management web administrative interface, and
could allow an authenticated user to inject arbitrary HTML or web
script into the interface. (CVE-2010-5312, CVE-2012-6662)

Note: The IdM version provided by this update no longer uses jQuery.

- Added the 'ipa-cacert-manage' command, which renews the
Certification Authority (CA) file.

- Added the ID Views feature.

- IdM now supports using one-time password (OTP)
authentication and allows gradual migration from
proprietary OTP solutions to the IdM OTP solution.

- Added the 'ipa-backup' and 'ipa-restore' commands to
allow manual backups.

- Added a solution for regulating access permissions to
specific sections of the IdM server.

This update also fixes several bugs, including :

- Previously, when IdM servers were configured to require
the Transport Layer Security protocol version 1.1
(TLSv1.1) or later in the httpd server, the 'ipa'
command-line utility failed. With this update, running
'ipa' works as expected with TLSv1.1 or later.

In addition, this update adds multiple enhancements, including :

- The 'ipa-getkeytab' utility can now optionally fetch
existing keytabs from the KDC. Previously, retrieving an
existing keytab was not supported, as the only option
was to generate a new key.

- You can now create and manage a '.' root zone on IdM
servers. DNS queries sent to the IdM DNS server use this
configured zone instead of the public zone.

- The IdM server web UI has been updated and is now based
on the Patternfly framework, offering better
responsiveness.

- A new user attribute now enables provisioning systems to
add custom tags for user objects. The tags can be used
for automember rules or for additional local
interpretation.

- This update adds a new DNS zone type to ensure that
forward and master zones are better separated. As a
result, the IdM DNS interface complies with the forward
zone semantics in BIND.

- This update adds a set of Apache modules that external
applications can use to achieve tighter interaction with
IdM beyond simple authentication.

- IdM supports configuring automember rules for automated
assignment of users or hosts in respective groups
according to their characteristics, such as the
'userClass' or 'departmentNumber' attributes.
Previously, the rules could be applied only to new
entries. This update allows applying the rules also to
existing users or hosts.

- The extdom plug-in translates Security Identifiers
(SIDs) of Active Directory (AD) users and groups to
names and POSIX IDs. With this update, extdom returns
the full member list for groups and the full list of
group memberships for a user, the GECOS field, the home
directory, as well as the login shell of a user. Also,
an optional list of key-value pairs contains the SID of
the requested object if the SID is available.

See also :

http://www.nessus.org/u?bab96c0d

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 82253 ()

Bugtraq ID:

CVE ID: CVE-2010-5312
CVE-2012-6662

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now