Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12173

Опубликовано: 03 окт. 2017
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

It was found that sssd's sysdb_search_user_by_upn_res() function did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

Отчет

This issue affects the versions of sssd as shipped with Red Hat Satellite version 6.0. More recent versions of Satellite no longer ships sssd. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

It is possible to disable manually credential caching :

  • Stop the sssd service
  • Delete the cache (rm -f /var/lib/sss/db/* /var/log/sssd/*) or manually remove the hashes for the database
  • In the sssd configuration file, change cache_credentials to False for each domains
  • start the sssd service again However, tools such as realmd & ipa-client-install might enable credential caching, and should be used with care.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sssdNot affected
Red Hat Satellite 6sssdAffected
Red Hat Enterprise Linux 6ding-libsFixedRHSA-2018:187719.06.2018
Red Hat Enterprise Linux 6sssdFixedRHSA-2018:187719.06.2018
Red Hat Enterprise Linux 7sssdFixedRHSA-2017:337905.12.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1498173sssd: unsanitized input when searching in local cache database

EPSS

Процентиль: 64%
0.00471
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS3: 4.3
nvd
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS3: 4.3
debian
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function befor ...

suse-cvrf
около 8 лет назад

Security update for sssd

suse-cvrf
около 8 лет назад

Security update for sssd

EPSS

Процентиль: 64%
0.00471
Низкий

4.3 Medium

CVSS3