CVE-2015-5292
Published Oct 29, 2015
Last updated 2 years ago
Overview
- Description
- Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFCDECF-26E1-4B23-A91D-F8DD668DF32A" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1590881-C44A-446E-BAF6-5CE59DAF6A66" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C32B676B-97B6-48AA-BE8D-743FE52B4438" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E963CF03-E0DC-4BEE-AAE3-DF09B2F57767" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0968753D-BA33-4D0B-849C-FC9B7EBDC70D" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B96047C-CA3E-4708-8EB3-F33CD0BE0FE9" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFAD8539-1CEC-454E-BA68-8D8B6033751E" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81824ADB-8797-45B0-9B83-953F899A00D3" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1890E09D-3AD6-4C46-AD2F-C89DCC436C02" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.11.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8041D271-F9DF-452F-BC4E-9F69B4A0F3A3" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2783866D-0DE2-4E92-90CB-53DA9B914A21" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C7D641D-E018-4EC1-9416-5C788C9F1107" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C81F4DF-4190-4D9B-8C1B-CD51B4678B93" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F52B44E7-71AB-4028-B9A3-E80508EF0AE7" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68D7CEC8-8D38-451D-B9C3-A68224125906" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.12.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09EAA45E-0F9E-4E04-BB81-C91E3357B030" }, { "criteria": "cpe:2.3:a:fedoraproject:sssd:1.13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E3A3029-5612-47C4-8F32-0209F4733AF7" } ], "operator": "OR" } ] } ]