Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16838

Опубликовано: 25 мар. 2019
Источник: debian
EPSS Низкий

Описание

A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sssdfixed2.2.0-1package
sssdno-dsastretchpackage
sssdnot-affectedjessiepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1640820

  • GPO based access control introduced in https://github.com/SSSD/sssd/commit/60cab26b12

  • seems to presuppose configuration mistake: if sssd is not given enough permissions

  • to read GPO, access is systematically granted instead of denied

  • https://pagure.io/SSSD/sssd/issue/3867

  • https://pagure.io/SSSD/sssd/c/ad058011b6b75b15c674be46a3ae9b3cc5228175 (sssd-1-16)

EPSS

Процентиль: 79%
0.01263
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 7 лет назад

A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.

CVSS3: 5.4
redhat
около 7 лет назад

A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.

CVSS3: 5.4
nvd
почти 7 лет назад

A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.

suse-cvrf
больше 6 лет назад

Security update for sssd

suse-cvrf
больше 6 лет назад

Security update for sssd

EPSS

Процентиль: 79%
0.01263
Низкий