{"id":"CVE-2016-7030","details":"FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.","modified":"2026-03-20T11:14:39.271447Z","published":"2017-08-28T15:29:01.533Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0001.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2017/01/02/5"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94934"},{"type":"ADVISORY","url":"https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370493"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freeipa/freeipa","events":[{"introduced":"0"},{"last_affected":"59e4bc285390886422d5e15314fa8e2fac1cc4bd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.6.0"}]}}],"versions":["alpha-1-9-0","alpha_1-4-2-0","alpha_1-4-4-0","alpha_2-1-9-0","alpha_3-1-9-0","alpha_4-1-9-0","alpha_5-1-9-0","alpha_5-1-9-0-1","beta_1-2-0-0","beta_1-3-0-0","beta_1-3-2-0","beta_1-3-3-0","beta_2-3-0-0","beta_2-3-3-0","milestone_2","milestone_3","milestone_4","milestone_4_1","milestone_6","rc_1-2-0-0","rc_2-2-0-0","rc_3-2-0-0","release-1-0-0","release-1-1-0","release-2-0-0","release-2-1-0","release-3-1-0","release-3-2-0","release-3-2-0-pre1","release-3-3-0","release-4-0-0","release-4-2-0","release-4-4-0","release-4-4-1","release-4-6-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7030.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}