First published: Fri Apr 29 2011(Updated: )
A flaw was introduced in SSSD 1.5.0 that, under certain conditions, would have sssd overwrite a cached password with the filename of the kerberos credential store (defined by krb5_ccache_template in sssd.conf). This could allow an attacker to gain access to an account without knowing the password if they knew the cached-credential string. This flaw does not affect earlier versions of SSSD that did not have support for automatic ticket renewal services.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora Hosted SSSD | =1.5.2 | |
Fedora Hosted SSSD | =1.5.0 | |
Fedora Hosted SSSD | =1.5.5 | |
Fedora Hosted SSSD | =1.5.6.1 | |
Fedora Hosted SSSD | =1.5.3 | |
Fedora Hosted SSSD | =1.5.1 | |
Fedora Hosted SSSD | =1.5.6 | |
Fedora Hosted SSSD | =1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1758 is classified as a moderate severity vulnerability that could allow unauthorized access to accounts.
To fix CVE-2011-1758, upgrade SSSD to version 1.5.7 or later, where the vulnerability has been addressed.
CVE-2011-1758 affects SSSD versions 1.5.0 through 1.5.6.1 inclusive.
The vulnerability occurs when SSSD incorrectly overwrites a cached password with the filename of the Kerberos credential store.
CVE-2011-1758 could potentially be exploited locally by an attacker with access to the system.