CWE
287
Advisory Published
CVE Published
Updated

CVE-2010-2940

First published: Wed Aug 18 2010(Updated: )

Ted Brunell reported that SSSD, when authenticating against an LDAP server that allows unauthenticated binds, would authenticate users providing an empty password to any service using pam_authenticate (such as the GNOME screensaver). This could allow a local or remote attacker to gain access to an account without knowing the victim's password. This flaw can only be exploited if the directory server allows unauthenticated binds, because the directory server will return that the bind was successful if no password is provided. Acknowledgements: Red Hat would like to thank Ted Brunell for reporting this issue.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Fedora Hosted SSSD=1.3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2010-2940?

    CVE-2010-2940 is considered a medium severity vulnerability due to the potential for unauthorized access.

  • How do I fix CVE-2010-2940?

    To fix CVE-2010-2940, update SSSD to a version later than 1.3.0 that addresses the unauthenticated bind issue.

  • What systems are affected by CVE-2010-2940?

    CVE-2010-2940 primarily affects SSSD versions 1.3.0 and those configured with LDAP servers allowing unauthenticated binds.

  • What type of attacks can exploit CVE-2010-2940?

    CVE-2010-2940 can be exploited by local or remote attackers to authenticate users with an empty password.

  • What services can be affected by CVE-2010-2940?

    Services using pam_authenticate, such as the GNOME screensaver, can be affected by CVE-2010-2940.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203