Rapid7 Vulnerability & Exploit Database

RHSA-2011:0975: sssd security, bug fix, and enhancement update

Back to Search

RHSA-2011:0975: sssd security, bug fix, and enhancement update

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
01/24/2011
Created
07/25/2018
Added
07/29/2011
Modified
07/04/2017

Description

The System Security Services Daemon (SSSD) provides a set of daemons tomanage access to remote directories and authentication mechanisms. Itprovides an NSS and PAM interface toward the system and a pluggableback-end system to connect to multiple different account sources. It isalso the basis to provide client auditing and policy services for projectssuch as FreeIPA.A flaw was found in the SSSD PAM responder that could allow a localattacker to force SSSD to enter an infinite loop via a carefully-craftedpacket. With SSSD unresponsive, legitimate users could be denied theability to log in to the system. (CVE-2010-4341)Red Hat would like to thank Sebastian Krahmer for reporting this issue.These updated sssd packages include a number of bug fixes and enhancements.Space precludes documenting all of these changes in this advisory. Refer tothe Red Hat Enterprise Linux 5.7 Technical Notes for information aboutthese changes:https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/sssd.html#RHSA-2011-0975All sssd users are advised to upgrade to these updated sssd packages, whichupgrade SSSD to upstream version 1.5.1 to correct this issue, and fix thebugs and add the enhancements noted in the Technical Notes.

Solution(s)

  • redhat-upgrade-sssd
  • redhat-upgrade-sssd-client
  • redhat-upgrade-sssd-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;