SB2011052604 - Improper Authentication in Pagure SSSD
Published: May 26, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Authentication (CVE-ID: CVE-2011-1758)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
Remediation
Install update from vendor's website.
References
- http://git.fedorahosted.org/git/?p=sssd.git;a=commit;h=fffdae81651b460f3d2c119c56d5caa09b4de42a
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059532.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059619.html
- http://openwall.com/lists/oss-security/2011/04/29/4
- https://bugzilla.redhat.com/show_bug.cgi?id=700867
- https://bugzilla.redhat.com/show_bug.cgi?id=700891
- https://fedorahosted.org/pipermail/sssd-devel/2011-April/006138.html
- https://fedorahosted.org/sssd/ticket/856
- https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.7