The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/43068 | third party advisory |
http://www.securityfocus.com/bid/45961 | vdb entry |
http://secunia.com/advisories/43055 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2011/0212 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=661163 | patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64881 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2011-0560.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html | patch vendor advisory |
http://www.vupen.com/english/advisories/2011/0197 | vdb entry vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-0975.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | vendor advisory |
http://secunia.com/advisories/43053 | third party advisory vendor advisory |