Page 2 of 7 results (0.003 seconds)

CVSS: 3.7EPSS: 0%CPEs: 8EXPL: 0

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname. La función krb5_save_ccname_done en providers/krb5/krb5_auth.c en el Security Services Daemon (SSSD) v1.5.x anteriores a v1.5.7 1.5.x, cuando la renovación automática de tickets la autenticación fuera de línea está configurada, utiliza una cadena de ruta como contraseña, lo que permite a usuarios locales eludir la autenticación Kerberos listando el directorio /tmp para obtener la ruta de acceso. • http://git.fedorahosted.org/git/?p=sssd.git%3Ba=commit%3Bh=fffdae81651b460f3d2c119c56d5caa09b4de42a http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059532.html http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059619.html http://openwall.com/lists/oss-security/2011/04/29/4 https://bugzilla.redhat.com/show_bug.cgi?id=700867 https://bugzilla.redhat.com/show_bug.cgi?id=700891 https://fedorahosted.org/pipermail/sssd-devel/2011-April/006138.html https://fedorahosted& • CWE-287: Improper Authentication •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet. La función pam_parse_in_data_v2 en src/responder/pam/pamsrv_cmd.c en el PAM responder en SSSD v.1.5.0, v.1.4.x, y v.1.3 permite a usuarios locales provocar una denegación de servicio (bucle infinito, caída, y prevención de login) a través de paquetes manipulados. • http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43053 http://secunia.com/advisories/43055 http://secunia.com/advisories/43068 http://www.redhat.com/support/errata/RHSA-2011-0560.html http://www.redhat.com/support/errata/RHSA-2011-0975.html http://www.securityfocus.com/bid&#x • CWE-399: Resource Management Errors •