First published: Tue May 27 2014(Updated: )
It was reported [1] that SSSD improperly expanded group membership when it encountered a non-POSIX group in the group membership chain. For instance: user -> posix_group1 -> non_posix_group -> posix_group2 With the group memberships noted above, SSSD should include the user as a member of both posix_group1 and posix_group2, however due to the position of the non-POSIX group, SSSD halts processing at it and never reaches posix_group2, leaving the user as a member of posix_group1 and not posix_group2. SSSD has the capability to set a 'deny' ACL for both users and groups, so in a situation like that illustrated above, if posix_group2 was present in a 'deny' ACL, the user would be granted access because they are not shown as having membership in the denied group. This could grant unintended access to certain users in an environment where non-POSIX groups are used in addition to POSIX groups. There is currently no patch to correct this issue. [1] <a href="https://lists.fedorahosted.org/pipermail/sssd-devel/2014-May/019495.html">https://lists.fedorahosted.org/pipermail/sssd-devel/2014-May/019495.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <1.11.7 | 1.11.7 |
Fedora Hosted SSSD | =1.11.6 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0249 has been classified as a moderate vulnerability due to improper group membership expansion in SSSD.
To fix CVE-2014-0249, update SSSD to version 1.11.7 or later.
CVE-2014-0249 affects SSSD versions prior to 1.11.7, including versions 1.11.6 and earlier.
SSSD, or System Security Services Daemon, is a service that provides access to identity and authentication resources, making CVE-2014-0249 a concern due to its potential impact on user group membership management.
There are no recommended workarounds for CVE-2014-0249; updating to the fixed version is advised.