First published: Wed Aug 18 2010(Updated: )
Ted Brunell reported that SSSD, when authenticating against an LDAP server that allows unauthenticated binds, would authenticate users providing an empty password to any service using pam_authenticate (such as the GNOME screensaver). This could allow a local or remote attacker to gain access to an account without knowing the victim's password. This flaw can only be exploited if the directory server allows unauthenticated binds, because the directory server will return that the bind was successful if no password is provided. Acknowledgements: Red Hat would like to thank Ted Brunell for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora Hosted SSSD | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2940 is considered a medium severity vulnerability due to the potential for unauthorized access.
To fix CVE-2010-2940, update SSSD to a version later than 1.3.0 that addresses the unauthenticated bind issue.
CVE-2010-2940 primarily affects SSSD versions 1.3.0 and those configured with LDAP servers allowing unauthenticated binds.
CVE-2010-2940 can be exploited by local or remote attackers to authenticate users with an empty password.
Services using pam_authenticate, such as the GNOME screensaver, can be affected by CVE-2010-2940.