Lucene search

K
osvGoogleOSV:USN-5067-1
HistorySep 08, 2021 - 11:40 a.m.

sssd vulnerabilities

2021-09-0811:40:23
Google
osv.dev
3

7.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.9%

Jakub Hrozek discovered that SSSD incorrectly handled file permissions. A
local attacker could possibly use this issue to read the sudo rules
available for any user. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10852)

It was discovered that SSSD incorrectly handled Group Policy Objects. When
SSSD is configured with too strict permissions causing the GPO to not be
readable, SSSD will allow all authenticated users to login instead of being
denied, contrary to expectations. This issue only affected Ubuntu 18.04
LTS. (CVE-2018-16838)

It was discovered that SSSD incorrectly handled users with no home
directory set. When no home directory was set, SSSD would return the root
directory instead of an empty string, possibly bypassing security measures.
This issue only affected Ubuntu 18.04 LTS. (CVE-2019-3811)

Cedric Buissart discovered that SSSD incorrectly handled the sssctl
command. In certain environments, a local user could use this issue to
execute arbitrary commands and possibly escalate privileges.
(CVE-2021-3621)