Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7488

Опубликовано: 09 мая 2017
Источник: redhat
CVSS3: 5.3

Описание

Authconfig version 6.2.8 is vulnerable to an Information exposure while using SSSD to authenticate against remote server resulting in the leak of information about existing usernames.

A flaw was found where authconfig could configure sssd in a way that treats existing and non-existing logins differently, leaking information on existence of a user. An attacker with physical or network access to the machine could enumerate users via a timing attack.

Меры по смягчению последствий

Possible workaround (with side-effects): authconfig --enablesysnetauth --update

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5authconfigNot affected
Red Hat Enterprise Linux 6authconfigNot affected
Red Hat Enterprise Linux 7authconfigFixedRHSA-2017:228501.08.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1441604authconfig: Information leak when SSSD is used for authentication against remote server

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
больше 8 лет назад

Authconfig version 6.2.8 is vulnerable to an Information exposure while using SSSD to authenticate against remote server resulting in the leak of information about existing usernames.

CVSS3: 4.3
github
больше 3 лет назад

Authconfig version 6.2.8 is vulnerable to an Information exposure while using SSSD to authenticate against remote server resulting in the leak of information about existing usernames.

oracle-oval
больше 8 лет назад

ELSA-2017-2285: authconfig security, bug fix, and enhancement update (MODERATE)

5.3 Medium

CVSS3