Security Advisory Important: pki-tps security update

Advisory: RHSA-2013:0856-1
Type: Security Advisory
Severity: Important
Issued on: 2013-05-22
Last updated on: 2013-05-22
Affected Products: Red Hat Certificate System v8
CVEs ( CVE-2013-1885


An updated pki-tps package that fixes two security issues is now available
for Red Hat Certificate System 8.1.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Red Hat Certificate System (RHCS) is an enterprise software system designed
to manage enterprise Public Key Infrastructure (PKI) deployments. The Token
Processing System (TPS) is a PKI subsystem that acts as a Registration
Authority (RA) for authenticating and processing enrollment requests, PIN
reset requests, and formatting requests from the Enterprise Security

A format string flaw was found in the TPS subsystem. An authenticated
Certificate System user could use this flaw to crash the Apache HTTP Server
child process, possibly interrupting the processing of other users'
requests, or possibly execute arbitrary code with pkiuser privileges.

A cross-site scripting flaw was discovered in the TPS subsystem. An
attacker could use this flaw to perform a cross-site scripting (XSS) attack
against victims using Certificate System's web interface. (CVE-2013-1885)

All users of Red Hat Certificate System are advised to upgrade to this
updated package, which corrects these issues. After installing this update,
all Red Hat Certificate System subsystems must be restarted ("/etc/init.d
/[instance-name] restart") for the update to take effect.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

Red Hat Certificate System v8

File outdated by:  RHEA-2013:1871
    MD5: 36cc63909f3647cc877accf99fe71a62
SHA-256: 4781791d3d098d241acdf560f8385bbc36935dfd9606d69345db00fde2e8e659
File outdated by:  RHEA-2013:1871
    MD5: afc588457165dc3b2e36468083ca5556
SHA-256: 84a33eea17ea2ce63c2379383e6de65a74183a7277c6d7ce0b21cd6b58fc04d4
File outdated by:  RHEA-2013:1871
    MD5: 8a04d2eee5fbda6b22ee9ba588bfb6d8
SHA-256: 493ee573db9b281c694ddaef31c96fdacc9db01f2debc4893eceea6c74a2e1b9
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

923039 - CVE-2013-1885 Certificate System: pki-tps XSS flaw
924870 - CVE-2013-1886 Certificate System: pki-tps format string injection


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at