CVE-2013-0287
sssd: simple access provider flaw prevents intended ACL use when client to an AD provider
Severity Score
4.9
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
El Simple Access Provider en System Security Services Daemon (SSSD) v1.9.0 hasta v1.9.4, cuando usa el proveedor de Active Directory, no se aplica correctamente la opciĆ³n simple_deny_groups, lo que permite a usuarios remotos autenticados para eludir restricciones de acceso previstos.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-12-06 CVE Reserved
- 2013-03-20 CVE Published
- 2024-02-09 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938 | X_refsource_misc | |
http://securitytracker.com/id?1028317 | Vdb Entry | |
http://www.securityfocus.com/bid/58593 | Vdb Entry | |
https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html | 2013-05-15 | |
http://rhn.redhat.com/errata/RHSA-2013-0663.html | 2013-05-15 | |
http://secunia.com/advisories/52704 | 2013-05-15 | |
http://secunia.com/advisories/52722 | 2013-05-15 | |
https://access.redhat.com/security/cve/CVE-2013-0287 | 2013-03-19 | |
https://bugzilla.redhat.com/show_bug.cgi?id=910938 | 2013-03-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fedoraproject Search vendor "Fedoraproject" | Sssd Search vendor "Fedoraproject" for product "Sssd" | 1.9.0 Search vendor "Fedoraproject" for product "Sssd" and version "1.9.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Sssd Search vendor "Fedoraproject" for product "Sssd" | 1.9.1 Search vendor "Fedoraproject" for product "Sssd" and version "1.9.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Sssd Search vendor "Fedoraproject" for product "Sssd" | 1.9.2 Search vendor "Fedoraproject" for product "Sssd" and version "1.9.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Sssd Search vendor "Fedoraproject" for product "Sssd" | 1.9.3 Search vendor "Fedoraproject" for product "Sssd" and version "1.9.3" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Sssd Search vendor "Fedoraproject" for product "Sssd" | 1.9.4 Search vendor "Fedoraproject" for product "Sssd" and version "1.9.4" | - |
Affected
|