ID CVE-2010-4341
Summary The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
References
Vulnerable Configurations
  • cpe:2.3:a:fedorahosted:sssd:1.4.0
    cpe:2.3:a:fedorahosted:sssd:1.4.0
  • cpe:2.3:a:fedorahosted:sssd:1.4.1
    cpe:2.3:a:fedorahosted:sssd:1.4.1
  • Fedora SSSD - System Security Services Daemon 1.3.0
    cpe:2.3:a:fedoraproject:sssd:1.3.0
  • Fedora SSSD - System Security Services Daemon 1.5.0
    cpe:2.3:a:fedoraproject:sssd:1.5.0
CVSS
Base: 2.1 (as of 25-01-2011 - 13:22)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-0364.NASL
    description Addresses low-priority CVE-2010-4341: DoS in sssd PAM responder can prevent logins Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 51655
    published 2011-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51655
    title Fedora 14 : sssd-1.5.0-2.fc14 (2011-0364)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_LIBCOLLECTION-DEVEL-110119.NASL
    description This update fixes a local denial-of-service attack that stops other users from logging in. The bug existed in the pam_parse_in_data_v2() function. (CVE-2010-4341: CVSS v2 Base Score: 2.1)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75573
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75573
    title openSUSE Security Update : libcollection-devel (openSUSE-SU-2011:0058-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0975.NASL
    description Updated sssd packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to force SSSD to enter an infinite loop via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) Red Hat would like to thank Sebastian Krahmer for reporting this issue. These updated sssd packages include a number of bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for information about these changes : https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/ 5.7_Technical_Notes/sssd.html#RHSA-2011-0975 All sssd users are advised to upgrade to these updated sssd packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 56260
    published 2011-09-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56260
    title CentOS 5 : sssd (CESA-2011:0975)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0560.NASL
    description Updated sssd packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to crash SSSD via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) Red Hat would like to thank Sebastian Krahmer for reporting this issue. This update also fixes several bugs and adds various enhancements. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. Users of SSSD should upgrade to these updated packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 54594
    published 2011-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54594
    title RHEL 6 : sssd (RHSA-2011:0560)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110721_SSSD_ON_SL5_X.NASL
    description The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to force SSSD to enter an infinite loop via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) These updated sssd packages include a number of bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. All sssd users are advised to upgrade to these updated sssd packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61094
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61094
    title Scientific Linux Security Update : sssd on SL5.x i386/x86_64
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-0337.NASL
    description Addresses low-priority CVE-2010-4341: DoS in sssd PAM responder can prevent logins Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 51651
    published 2011-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51651
    title Fedora 13 : sssd-1.3.0-40.fc13 (2011-0337)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0975.NASL
    description Updated sssd packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to force SSSD to enter an infinite loop via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) Red Hat would like to thank Sebastian Krahmer for reporting this issue. These updated sssd packages include a number of bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for information about these changes : https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/ 5.7_Technical_Notes/sssd.html#RHSA-2011-0975 All sssd users are advised to upgrade to these updated sssd packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 55642
    published 2011-07-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55642
    title RHEL 5 : sssd (RHSA-2011:0975)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110519_SSSD_ON_SL6_X.NASL
    description The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to crash SSSD via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) This update also fixes several bugs and adds various enhancements. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. Users of SSSD should upgrade to these updated packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61049
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61049
    title Scientific Linux Security Update : sssd on SL6.x i386/x86_64
redhat via4
advisories
  • bugzilla
    id 701700
    title sssd client libraries use select() but should use poll() instead
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment sssd is earlier than 0:1.5.1-34.el6
          oval oval:com.redhat.rhsa:tst:20110560005
        • comment sssd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20141375006
      • AND
        • comment sssd-client is earlier than 0:1.5.1-34.el6
          oval oval:com.redhat.rhsa:tst:20110560007
        • comment sssd-client is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20141375036
      • AND
        • comment sssd-tools is earlier than 0:1.5.1-34.el6
          oval oval:com.redhat.rhsa:tst:20110560009
        • comment sssd-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20141375040
    rhsa
    id RHSA-2011:0560
    released 2011-05-19
    severity Low
    title RHSA-2011:0560: sssd security, bug fix, and enhancement update (Low)
  • bugzilla
    id 707574
    title SSSD's async resolver only tries the first nameserver in /etc/resolv.conf
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment sssd is earlier than 0:1.5.1-37.el5
          oval oval:com.redhat.rhsa:tst:20110975002
        • comment sssd is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20110975003
      • AND
        • comment sssd-client is earlier than 0:1.5.1-37.el5
          oval oval:com.redhat.rhsa:tst:20110975006
        • comment sssd-client is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20110975007
      • AND
        • comment sssd-tools is earlier than 0:1.5.1-37.el5
          oval oval:com.redhat.rhsa:tst:20110975004
        • comment sssd-tools is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20110975005
    rhsa
    id RHSA-2011:0975
    released 2011-07-21
    severity Low
    title RHSA-2011:0975: sssd security, bug fix, and enhancement update (Low)
rpms
  • sssd-0:1.5.1-34.el6
  • sssd-client-0:1.5.1-34.el6
  • sssd-tools-0:1.5.1-34.el6
  • sssd-0:1.5.1-37.el5
  • sssd-client-0:1.5.1-37.el5
  • sssd-tools-0:1.5.1-37.el5
refmap via4
bid 45961
confirm https://bugzilla.redhat.com/show_bug.cgi?id=661163
fedora
  • FEDORA-2011-0337
  • FEDORA-2011-0364
secunia
  • 43053
  • 43055
  • 43068
suse SUSE-SR:2011:002
vupen
  • ADV-2011-0197
  • ADV-2011-0212
xf sssd-pamparseindatav2-dos(64881)
Last major update 26-08-2011 - 23:45
Published 24-01-2011 - 20:00
Last modified 16-08-2017 - 21:33
Back to Top