First published: Tue Oct 03 2017(Updated: )
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <1.16.0 | 1.16.0 |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Fedora Hosted SSSD | <1.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12173 is considered a high severity vulnerability due to its potential for injection attacks.
To fix CVE-2017-12173, upgrade the sssd package to version 1.16.0 or later.
CVE-2017-12173 affects Red Hat Enterprise Linux desktop and server versions 6.0 and 7.0, among other derivatives.
No, CVE-2017-12173 requires an authenticated attacker to exploit the vulnerability.
CVE-2017-12173 is caused by inadequate sanitization of requests in the sysdb_search_user_by_upn_res() function.