First published: Fri Apr 29 2011(Updated: )
A flaw was introduced in SSSD 1.5.0 that, under certain conditions, would have sssd overwrite a cached password with the filename of the kerberos credential store (defined by krb5_ccache_template in sssd.conf). This could allow an attacker to gain access to an account without knowing the password if they knew the cached-credential string. This flaw does not affect earlier versions of SSSD that did not have support for automatic ticket renewal services.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE SSSD (System Security Services Daemon) with Kerberos 5 support | >1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-700867 is high due to the potential for unauthorized access to accounts without knowing passwords.
To fix REDHAT-BUG-700867, upgrade to a version of SSSD later than 1.5.0 that addresses this flaw.
The implications of REDHAT-BUG-700867 include increased risk of credential theft and unauthorized access to accounts leveraging the cached passwords.
REDHAT-BUG-700867 affects SSSD version 1.5.0 and earlier, particularly in configurations using Kerberos.
Yes, an attacker could potentially exploit REDHAT-BUG-700867 remotely under specific conditions where they can manipulate the cached password.