Fedora SSSD - System Security Services Daemon 1.9.4

CPE Details

Fedora SSSD - System Security Services Daemon 1.9.4
1.9.4
2013-03-22
13h26 +00:00
2013-03-26
21h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:fedoraproject:sssd:1.9.4:*:*:*:*:*:*:*

Informations

Vendor

fedoraproject

Product

sssd

Version

1.9.4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-3811 2019-01-15 15h00 +00:00 A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
5.2
Medium
CVE-2017-12173 2018-07-27 14h00 +00:00 It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
8.8
High
CVE-2018-10852 2018-06-26 12h00 +00:00 The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
7.5
High
CVE-2013-0287 2013-03-21 15h00 +00:00 The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
4.9