First published: Fri Apr 29 2011(Updated: )
A flaw was introduced in SSSD 1.5.0 that, under certain conditions, would have sssd overwrite a cached password with the filename of the kerberos credential store (defined by krb5_ccache_template in sssd.conf). This could allow an attacker to gain access to an account without knowing the password if they knew the cached-credential string. This flaw does not affect earlier versions of SSSD that did not have support for automatic ticket renewal services.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Sssd | =1.5.2 | |
Fedoraproject Sssd | =1.5.0 | |
Fedoraproject Sssd | =1.5.5 | |
Fedoraproject Sssd | =1.5.6.1 | |
Fedoraproject Sssd | =1.5.3 | |
Fedoraproject Sssd | =1.5.1 | |
Fedoraproject Sssd | =1.5.6 | |
Fedoraproject Sssd | =1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.