[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-5292Date: (C)2015-12-15   (M)2023-12-22


Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.0
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECTRACK-1034038
BID-77529
FEDORA-2015-202c127199
FEDORA-2015-7b47df69d3
FEDORA-2015-cdea5324a8
RHSA-2015:2019
RHSA-2015:2355
http://permalink.gmane.org/gmane.linux.redhat.sssd.user/3422
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://bugzilla.redhat.com/show_bug.cgi?id=1267580
https://fedorahosted.org/sssd/attachment/ticket/2803/0001-Fix-memory-leak-in-sssdpac_verify.patch
https://fedorahosted.org/sssd/ticket/2803
https://fedorahosted.org/sssd/wiki/Releases/Notes-1.13.1

CWE    1
CWE-399
OVAL    9
oval:org.secpod.oval:def:204252
oval:org.secpod.oval:def:1600330
oval:org.secpod.oval:def:109599
oval:org.secpod.oval:def:501696
...

© SecPod Technologies