Rapid7 Vulnerability & Exploit Database

RHSA-2011:0560: sssd security, bug fix, and enhancement update

Back to Search

RHSA-2011:0560: sssd security, bug fix, and enhancement update

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
01/24/2011
Created
07/25/2018
Added
06/02/2011
Modified
07/04/2017

Description

The System Security Services Daemon (SSSD) provides a set of daemons tomanage access to remote directories and authentication mechanisms. Itprovides an NSS and PAM interface toward the system and a pluggableback-end system to connect to multiple different account sources. It isalso the basis to provide client auditing and policy services for projectssuch as FreeIPA.A flaw was found in the SSSD PAM responder that could allow a localattacker to crash SSSD via a carefully-crafted packet. With SSSDunresponsive, legitimate users could be denied the ability to log in to thesystem. (CVE-2010-4341)Red Hat would like to thank Sebastian Krahmer for reporting this issue.This update also fixes several bugs and adds various enhancements.Documentation for these bug fixes and enhancements will be availableshortly from the Technical Notes document, linked to in the Referencessection.Users of SSSD should upgrade to these updated packages, which upgrade SSSDto upstream version 1.5.1 to correct this issue, and fix the bugs and addthe enhancements noted in the Technical Notes.

Solution(s)

  • redhat-upgrade-sssd
  • redhat-upgrade-sssd-client
  • redhat-upgrade-sssd-debuginfo
  • redhat-upgrade-sssd-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;