Memory leak in System Security Services Daemon (SSSD) - CVE-2015-5292

 

Memory leak in System Security Services Daemon (SSSD) - CVE-2015-5292

Published: October 29, 2015 / Updated: May 9, 2023


Vulnerability identifier: #VU40622
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-5292
CWE-ID: CWE-401
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: SSSD
Affected software:
System Security Services Daemon (SSSD)

Detailed vulnerability description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication. A remote attacker can perform a denial of service attack.


How to mitigate CVE-2015-5292

Install update from vendor's website.

Sources