CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
10.1%
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
Vendor | Product | Version | CPE |
---|---|---|---|
fedorahosted | sssd | 1.4.0 | cpe:2.3:a:fedorahosted:sssd:1.4.0:*:*:*:*:*:*:* |
fedorahosted | sssd | 1.4.1 | cpe:2.3:a:fedorahosted:sssd:1.4.1:*:*:*:*:*:*:* |
fedoraproject | sssd | 1.3.0 | cpe:2.3:a:fedoraproject:sssd:1.3.0:*:*:*:*:*:*:* |
fedoraproject | sssd | 1.5.0 | cpe:2.3:a:fedoraproject:sssd:1.5.0:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html
lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
secunia.com/advisories/43053
secunia.com/advisories/43055
secunia.com/advisories/43068
www.redhat.com/support/errata/RHSA-2011-0560.html
www.redhat.com/support/errata/RHSA-2011-0975.html
www.securityfocus.com/bid/45961
www.vupen.com/english/advisories/2011/0197
www.vupen.com/english/advisories/2011/0212
bugzilla.redhat.com/show_bug.cgi?id=661163
exchange.xforce.ibmcloud.com/vulnerabilities/64881