Fedoraproject Sssd vulnerabilities
17 known vulnerabilities affecting fedoraproject/sssd.
Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH6MEDIUM6LOW5
Vulnerabilities
Page 1 of 1
CVE-2023-3758HIGHCVSS 7.1fixed in 2.9.52024-04-18
CVE-2023-3758 [HIGH] CWE-362 CVE-2023-3758: A race condition flaw was found in sssd where the GPO policy is not consistently applied for authent
A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
nvd
CVE-2022-4254HIGHCVSS 8.8≥ 1.15.3, < 2.3.12023-02-01
CVE-2022-4254 [HIGH] CWE-90 CVE-2022-4254: sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
nvd
CVE-2021-3621HIGHCVSS 8.8v2.6.02021-12-23
CVE-2021-3621 [HIGH] CWE-77 CVE-2021-3621: A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrit
nvd
CVE-2012-3462HIGHCVSS 8.8v1.9.02019-12-26
CVE-2012-3462 [HIGH] CWE-287 CVE-2012-3462: A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HB
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
nvd
CVE-2019-3811MEDIUMCVSS 5.2fixed in 2.12019-01-15
CVE-2019-3811 [MEDIUM] CWE-200 CVE-2019-3811: A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would r
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
nvd
CVE-2018-16883MEDIUMCVSS 5.5≥ 1.13.0, < 2.0.02018-12-19
CVE-2018-16883 [LOW] CWE-200 CVE-2018-16883: sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according
sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.
nvd
CVE-2017-12173HIGHCVSS 8.8fixed in 1.16.02018-07-27
CVE-2017-12173 [MEDIUM] CWE-20 CVE-2017-12173: It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requ
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
nvd
CVE-2018-10852HIGHCVSS 7.5fixed in 1.16.32018-06-26
CVE-2018-10852 [LOW] CWE-200 CVE-2018-10852: The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wi
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
nvd
CVE-2015-5292MEDIUMCVSS 6.8v1.10.0v1.10.1+15 more2015-10-29
CVE-2015-5292 [MEDIUM] CWE-399 CVE-2015-5292: Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in Sy
Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
nvd
CVE-2014-0249LOWCVSS 3.3v1.11.62014-06-11
CVE-2014-0249 [LOW] CWE-264 CVE-2014-0249: The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
nvd
CVE-2013-0287MEDIUMCVSS 4.9v1.9.0v1.9.1+3 more2013-03-21
CVE-2013-0287 [MEDIUM] CWE-264 CVE-2013-0287: The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the A
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
nvd
CVE-2013-0220MEDIUMCVSS 5.0≤ 1.9.3v0.2.1+71 more2013-02-24
CVE-2013-0220 [MEDIUM] CWE-119 CVE-2013-0220: The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/a
The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a craf
nvd
CVE-2013-0219LOWCVSS 3.7≤ 1.9.3v0.2.1+71 more2013-02-24
CVE-2013-0219 [LOW] CWE-264 CVE-2013-0219: System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing
System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
nvd
CVE-2011-1758LOWCVSS 3.7v1.5.0v1.5.1+6 more2011-05-26
CVE-2011-1758 [LOW] CWE-287 CVE-2011-1758: The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
nvd
CVE-2010-4341LOWCVSS 2.1v1.3.0v1.5.02011-01-25
CVE-2010-4341 [LOW] CWE-399 CVE-2010-4341: The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
nvd
CVE-2010-2940MEDIUMCVSS 5.1v1.3.02010-08-30
CVE-2010-2940 [MEDIUM] CWE-287 CVE-2010-2940: The auth_send function in providers/ldap/ldap_auth.c in System Security Services Daemon (SSSD) 1.3.0
The auth_send function in providers/ldap/ldap_auth.c in System Security Services Daemon (SSSD) 1.3.0, when LDAP authentication and anonymous bind are enabled, allows remote attackers to bypass the authentication requirements of pam_authenticate via an empty password.
nvd
CVE-2010-0014LOWCVSS 3.7≤ 1.0.0v0.2.1+13 more2010-01-14
CVE-2010-0014 [LOW] CWE-287 CVE-2010-0014: System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but t
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation that has any user's Kerberos ticket-granting ticket (TGT); and might allow remote attackers to bypass in
nvd