First published: Tue Dec 07 2010(Updated: )
Sebastian Krahmer discovered that it was possible to make sssd hang forever inside a loop in the pam_parse_in_data_v2() function of SSSD's PAM responder by using a carefully crafted packet to sssd. This could be exploited by a local attacker to crash sssd and prevent other legitimate users from logging into the system. Acknowledgements: Red Hat would like to thank Sebastian Krahmer for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Sssd | =1.5.0 | |
Fedorahosted Sssd | =1.4.0 | |
Fedorahosted Sssd | =1.4.1 | |
Fedoraproject Sssd | =1.3.0 | |
redhat/sssd | <1.5.1 | 1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.