CVE-2013-0219 – sssd: TOCTOU race conditions by copying and removing directory trees
https://notcve.org/view.php?id=CVE-2013-0219
System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files. System Security Services Daemon (SSSD) anterior a v1.9.4, cuando (1) se crea, (2) copia, o (3) elimina el directorio home de usuario, permite a usuarios locales crear, modificar o eliminar ficheros arbitrarios mediante un ataque de enlace simbólicos sobre otros ficheros del usuario. • http://git.fedorahosted.org/cgit/sssd.git/commit/?id=020bf88fd1c5bdac8fc671b37c7118f5378c7047 http://git.fedorahosted.org/cgit/sssd.git/commit/?id=3843b284cd3e8f88327772ebebc7249990fd87b9 http://git.fedorahosted.org/cgit/sssd.git/commit/?id=94cbf1cfb0f88c967f1fb0a4cf23723148868e4a http://git.fedorahosted.org/cgit/sssd.git/commit/?id=e864d914a44a37016736554e9257c06b18c57d37 http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098434.html http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098613.html http: • CWE-264: Permissions, Privileges, and Access Controls CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2011-1758
https://notcve.org/view.php?id=CVE-2011-1758
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname. La función krb5_save_ccname_done en providers/krb5/krb5_auth.c en el Security Services Daemon (SSSD) v1.5.x anteriores a v1.5.7 1.5.x, cuando la renovación automática de tickets la autenticación fuera de línea está configurada, utiliza una cadena de ruta como contraseña, lo que permite a usuarios locales eludir la autenticación Kerberos listando el directorio /tmp para obtener la ruta de acceso. • http://git.fedorahosted.org/git/?p=sssd.git%3Ba=commit%3Bh=fffdae81651b460f3d2c119c56d5caa09b4de42a http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059532.html http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059619.html http://openwall.com/lists/oss-security/2011/04/29/4 https://bugzilla.redhat.com/show_bug.cgi?id=700867 https://bugzilla.redhat.com/show_bug.cgi?id=700891 https://fedorahosted.org/pipermail/sssd-devel/2011-April/006138.html https://fedorahosted& • CWE-287: Improper Authentication •
CVE-2010-4341 – sssd: DoS in sssd PAM responder can prevent logins
https://notcve.org/view.php?id=CVE-2010-4341
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet. La función pam_parse_in_data_v2 en src/responder/pam/pamsrv_cmd.c en el PAM responder en SSSD v.1.5.0, v.1.4.x, y v.1.3 permite a usuarios locales provocar una denegación de servicio (bucle infinito, caída, y prevención de login) a través de paquetes manipulados. • http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43053 http://secunia.com/advisories/43055 http://secunia.com/advisories/43068 http://www.redhat.com/support/errata/RHSA-2011-0560.html http://www.redhat.com/support/errata/RHSA-2011-0975.html http://www.securityfocus.com/bid • CWE-399: Resource Management Errors •
CVE-2010-2940
https://notcve.org/view.php?id=CVE-2010-2940
The auth_send function in providers/ldap/ldap_auth.c in System Security Services Daemon (SSSD) 1.3.0, when LDAP authentication and anonymous bind are enabled, allows remote attackers to bypass the authentication requirements of pam_authenticate via an empty password. La función auth_send de providers/ldap/ldap_auth.c de System Security Services Daemon (SSSD) v1.3.0, si la autenticación LDAP y vinculaciones (bind) anónimas están activadas, permite a atacantes remotos evitar los requisitos de autenticación de pam_authenticate a través de una contraseña vacía. • http://secunia.com/advisories/41159 https://bugzilla.redhat.com/show_bug.cgi?id=625189 https://exchange.xforce.ibmcloud.com/vulnerabilities/61399 • CWE-287: Improper Authentication •
CVE-2010-0014
https://notcve.org/view.php?id=CVE-2010-0014
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation that has any user's Kerberos ticket-granting ticket (TGT); and might allow remote attackers to bypass intended access restrictions via vectors involving an arbitrary password in conjunction with a valid TGT. System Security Services Daemon (SSSD) anterior a v1.0.1, cuando stá configurado krb5 auth_provider pero el KDC es inalcanzable, permite autenticarse a atacantes próximos físicamente, a través de una contraseña de su elección sobre el programa de bloqueo de pantalla en una estación de trabajo que tiene algún ticket de usuario del tipo Kerberos ticket-granting (TGT); y podría permitir a atacantes remotos evitar las restricciones de acceso establecidas a través de vectores que involucran una contraseña arbitraria en conjunción con un TGT válido. • http://secunia.com/advisories/38160 http://www.securityfocus.com/bid/37747 https://bugzilla.redhat.com/show_bug.cgi?id=553233 https://fedorahosted.org/sssd/wiki/Releases/Notes-1.0.1 • CWE-287: Improper Authentication •