Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rqv8-76v6-fcx2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.

EPSS

Процентиль: 15%
0.00048
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 14 лет назад

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.

nvd
больше 14 лет назад

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.

debian
больше 14 лет назад

The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in Sy ...

EPSS

Процентиль: 15%
0.00048
Низкий

Дефекты

CWE-287