CVE-2013-0287

The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=26590d31f492dbbd36be6d0bde46a4bd3b221edb Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6569d57e3bc168e6e83d70333b48c5cb43aa04c4 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6837eee3f7f81c0ee454d3718d67d7f3cc6b48ef Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=7619be9f6bf649665fcbeee9e6b120f9f9cba2a5 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=b63830b142053f99bfe954d4be5a2b0f68ce3a93 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1 Patch
http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html
http://rhn.redhat.com/errata/RHSA-2013-0663.html
http://secunia.com/advisories/52704 Vendor Advisory
http://secunia.com/advisories/52722 Vendor Advisory
http://securitytracker.com/id?1028317
http://www.securityfocus.com/bid/58593
https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=26590d31f492dbbd36be6d0bde46a4bd3b221edb Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6569d57e3bc168e6e83d70333b48c5cb43aa04c4 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6837eee3f7f81c0ee454d3718d67d7f3cc6b48ef Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=7619be9f6bf649665fcbeee9e6b120f9f9cba2a5 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=b63830b142053f99bfe954d4be5a2b0f68ce3a93 Patch
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1 Patch
http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html
http://rhn.redhat.com/errata/RHSA-2013-0663.html
http://secunia.com/advisories/52704 Vendor Advisory
http://secunia.com/advisories/52722 Vendor Advisory
http://securitytracker.com/id?1028317
http://www.securityfocus.com/bid/58593
https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fedoraproject:sssd:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.9.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938 -
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=26590d31f492dbbd36be6d0bde46a4bd3b221edb - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=26590d31f492dbbd36be6d0bde46a4bd3b221edb - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6569d57e3bc168e6e83d70333b48c5cb43aa04c4 - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6569d57e3bc168e6e83d70333b48c5cb43aa04c4 - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6837eee3f7f81c0ee454d3718d67d7f3cc6b48ef - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6837eee3f7f81c0ee454d3718d67d7f3cc6b48ef - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=7619be9f6bf649665fcbeee9e6b120f9f9cba2a5 - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=7619be9f6bf649665fcbeee9e6b120f9f9cba2a5 - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=b63830b142053f99bfe954d4be5a2b0f68ce3a93 - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=b63830b142053f99bfe954d4be5a2b0f68ce3a93 - Patch
References () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1 - Patch () http://git.fedorahosted.org/cgit/sssd.git/patch/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1 - Patch
References () http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html - () http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0663.html - () http://rhn.redhat.com/errata/RHSA-2013-0663.html -
References () http://secunia.com/advisories/52704 - Vendor Advisory () http://secunia.com/advisories/52704 - Vendor Advisory
References () http://secunia.com/advisories/52722 - Vendor Advisory () http://secunia.com/advisories/52722 - Vendor Advisory
References () http://securitytracker.com/id?1028317 - () http://securitytracker.com/id?1028317 -
References () http://www.securityfocus.com/bid/58593 - () http://www.securityfocus.com/bid/58593 -
References () https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html - () https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html -

Information

Published : 2013-03-21 16:55

Updated : 2024-11-21 01:47


NVD link : CVE-2013-0287

Mitre link : CVE-2013-0287

CVE.ORG link : CVE-2013-0287


JSON object : View

Products Affected

fedoraproject

  • sssd
CWE
CWE-264

Permissions, Privileges, and Access Controls