Rapid7 Vulnerability & Exploit Database

Cent OS: CVE-2015-5292: CESA-2015:2019 (sssd)

Back to Search

Cent OS: CVE-2015-5292: CESA-2015:2019 (sssd)

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
10/29/2015
Created
07/25/2018
Added
12/01/2016
Modified
07/04/2017

Description

Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.

Solution(s)

  • centos-upgrade-libipa_hbac
  • centos-upgrade-libipa_hbac-devel
  • centos-upgrade-libipa_hbac-python
  • centos-upgrade-libsss_idmap
  • centos-upgrade-libsss_idmap-devel
  • centos-upgrade-libsss_nss_idmap
  • centos-upgrade-libsss_nss_idmap-devel
  • centos-upgrade-libsss_nss_idmap-python
  • centos-upgrade-libsss_simpleifp
  • centos-upgrade-libsss_simpleifp-devel
  • centos-upgrade-python-sssdconfig
  • centos-upgrade-sssd
  • centos-upgrade-sssd-ad
  • centos-upgrade-sssd-client
  • centos-upgrade-sssd-common
  • centos-upgrade-sssd-common-pac
  • centos-upgrade-sssd-dbus
  • centos-upgrade-sssd-ipa
  • centos-upgrade-sssd-krb5
  • centos-upgrade-sssd-krb5-common
  • centos-upgrade-sssd-ldap
  • centos-upgrade-sssd-proxy
  • centos-upgrade-sssd-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;