CVE-2010-4341

The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/43053 Vendor Advisory
http://secunia.com/advisories/43055 Vendor Advisory
http://secunia.com/advisories/43068
http://www.redhat.com/support/errata/RHSA-2011-0560.html
http://www.redhat.com/support/errata/RHSA-2011-0975.html
http://www.securityfocus.com/bid/45961
http://www.vupen.com/english/advisories/2011/0197 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212
https://bugzilla.redhat.com/show_bug.cgi?id=661163 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64881
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/43053 Vendor Advisory
http://secunia.com/advisories/43055 Vendor Advisory
http://secunia.com/advisories/43068
http://www.redhat.com/support/errata/RHSA-2011-0560.html
http://www.redhat.com/support/errata/RHSA-2011-0975.html
http://www.securityfocus.com/bid/45961
http://www.vupen.com/english/advisories/2011/0197 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212
https://bugzilla.redhat.com/show_bug.cgi?id=661163 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64881
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fedorahosted:sssd:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fedorahosted:sssd:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/43053 - Vendor Advisory () http://secunia.com/advisories/43053 - Vendor Advisory
References () http://secunia.com/advisories/43055 - Vendor Advisory () http://secunia.com/advisories/43055 - Vendor Advisory
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://www.redhat.com/support/errata/RHSA-2011-0560.html - () http://www.redhat.com/support/errata/RHSA-2011-0560.html -
References () http://www.redhat.com/support/errata/RHSA-2011-0975.html - () http://www.redhat.com/support/errata/RHSA-2011-0975.html -
References () http://www.securityfocus.com/bid/45961 - () http://www.securityfocus.com/bid/45961 -
References () http://www.vupen.com/english/advisories/2011/0197 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0197 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=661163 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=661163 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64881 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64881 -

Information

Published : 2011-01-25 01:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4341

Mitre link : CVE-2010-4341

CVE.ORG link : CVE-2010-4341


JSON object : View

Products Affected

fedoraproject

  • sssd

fedorahosted

  • sssd
CWE
CWE-399

Resource Management Errors