Resource management error in System Security Services Daemon (SSSD) - CVE-2010-4341
Published: January 25, 2011 / Updated: August 11, 2020
System Security Services Daemon (SSSD)
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
How to mitigate CVE-2010-4341
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/43053
- http://secunia.com/advisories/43055
- http://secunia.com/advisories/43068
- http://www.redhat.com/support/errata/RHSA-2011-0560.html
- http://www.redhat.com/support/errata/RHSA-2011-0975.html
- http://www.securityfocus.com/bid/45961
- http://www.vupen.com/english/advisories/2011/0197
- http://www.vupen.com/english/advisories/2011/0212
- https://bugzilla.redhat.com/show_bug.cgi?id=661163
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64881