SUSE update for Recommended update for sssd



Published: 2024-07-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-1247
CWE-ID CWE-264
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

sssd-krb5-common
Operating systems & Components / Operating system package or component

libsss_certmap0-debuginfo
Operating systems & Components / Operating system package or component

sssd-ldap-debuginfo
Operating systems & Components / Operating system package or component

libsss_certmap0
Operating systems & Components / Operating system package or component

libsss_nss_idmap0-debuginfo
Operating systems & Components / Operating system package or component

sssd-ldap
Operating systems & Components / Operating system package or component

sssd-common
Operating systems & Components / Operating system package or component

sssd
Operating systems & Components / Operating system package or component

libsss_idmap0
Operating systems & Components / Operating system package or component

sssd-krb5-common-debuginfo
Operating systems & Components / Operating system package or component

libsss_nss_idmap0
Operating systems & Components / Operating system package or component

sssd-debugsource
Operating systems & Components / Operating system package or component

sssd-common-debuginfo
Operating systems & Components / Operating system package or component

libsss_idmap0-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Privilege escalation

EUVDB-ID: #VU1082

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2016-1247

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to gain elevated privileges on the target system.
The weakness is due to improper handling of log file permissions in the '/var/log/nginx' directory by nginx packages. A locall attacker with 'www-data' user privileges can obtain root privileges on the target system.
Successful exploitation of the vulnerability results in privilege escalation on the vulnerable system.

Mitigation

Update the affected package Recommended update for sssd to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

sssd-krb5-common: before 2.5.2-150500.10.20.2

libsss_certmap0-debuginfo: before 2.5.2-150500.10.20.2

sssd-ldap-debuginfo: before 2.5.2-150500.10.20.2

libsss_certmap0: before 2.5.2-150500.10.20.2

libsss_nss_idmap0-debuginfo: before 2.5.2-150500.10.20.2

sssd-ldap: before 2.5.2-150500.10.20.2

sssd-common: before 2.5.2-150500.10.20.2

sssd: before 2.5.2-150500.10.20.2

libsss_idmap0: before 2.5.2-150500.10.20.2

sssd-krb5-common-debuginfo: before 2.5.2-150500.10.20.2

libsss_nss_idmap0: before 2.5.2-150500.10.20.2

sssd-debugsource: before 2.5.2-150500.10.20.2

sssd-common-debuginfo: before 2.5.2-150500.10.20.2

libsss_idmap0-debuginfo: before 2.5.2-150500.10.20.2

External links

http://www.suse.com/support/update/announcement/2024/suse-ru-20241993-2/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###