Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown

CVE-2022-4254

Disclosure Date: February 01, 2023 (last updated October 08, 2023)
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
Attacker Value
Unknown

CVE-2021-3621

Disclosure Date: December 23, 2021 (last updated March 05, 2024)
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2012-3462

Disclosure Date: December 26, 2019 (last updated November 27, 2024)
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
Attacker Value
Unknown

CVE-2018-16838

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
0
Attacker Value
Unknown

CVE-2019-3811

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
Attacker Value
Unknown

CVE-2018-16883

Disclosure Date: December 19, 2018 (last updated November 27, 2024)
sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.
0
Attacker Value
Unknown

CVE-2017-12173

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
0
Attacker Value
Unknown

CVE-2018-10852

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
0
Attacker Value
Unknown

CVE-2015-5292

Disclosure Date: October 29, 2015 (last updated October 05, 2023)
Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
0
Attacker Value
Unknown

CVE-2014-0249

Disclosure Date: June 11, 2014 (last updated October 05, 2023)
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
0