The local_handler_callback function in server/responder/pam/pam_LOCAL_domain.c in sssd 0.4.1 does not properly handle blank-password accounts in the SSSD BE database, which allows context-dependent attackers to obtain access by sending the account's username, in conjunction with an arbitrary password, over an ssh connection.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://secunia.com/advisories/36018 | third party advisory vendor advisory |
https://bugzilla.redhat.com/attachment.cgi?id=355424 | exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=514057 | |
http://www.securityfocus.com/bid/35868 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52210 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01236.html | vendor advisory |