First published: Tue Dec 07 2010(Updated: )
Sebastian Krahmer discovered that it was possible to make sssd hang forever inside a loop in the pam_parse_in_data_v2() function of SSSD's PAM responder by using a carefully crafted packet to sssd. This could be exploited by a local attacker to crash sssd and prevent other legitimate users from logging into the system. Acknowledgements: Red Hat would like to thank Sebastian Krahmer for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <1.5.1 | 1.5.1 |
Fedora Hosted SSSD | =1.4.0 | |
Fedora Hosted SSSD | =1.4.1 | |
Fedora Hosted SSSD | =1.3.0 | |
Fedora Hosted SSSD | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4341 is a high severity vulnerability that can cause SSSD to crash.
To fix CVE-2010-4341, upgrade SSSD to version 1.5.1 or later.
CVE-2010-4341 affects SSSD versions 1.3.0, 1.4.0, 1.4.1, and 1.5.0.
CVE-2010-4341 can be exploited by local attackers with access to the SSSD service.
CVE-2010-4341 impacts the stability of the SSSD service by causing it to hang indefinitely.