CVE-2015-5292

Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fedoraproject:sssd:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.3:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.4:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.5:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.6:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.11.7:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.1:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.2:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.3:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.4:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.12.5:*:*:*:*:*:*:*
cpe:2.3:a:fedoraproject:sssd:1.13.0:*:*:*:*:*:*:*

History

13 Feb 2023, 00:53

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2355', 'name': 'https://access.redhat.com/errata/RHSA-2015:2355', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2019', 'name': 'https://access.redhat.com/errata/RHSA-2015:2019', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2015-5292', 'name': 'https://access.redhat.com/security/cve/CVE-2015-5292', 'tags': [], 'refsource': 'MISC'}
Summary It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in. Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.

02 Feb 2023, 21:15

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2355 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2019 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2015-5292 -
Summary Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication. It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in.

Information

Published : 2015-10-29 16:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-5292

Mitre link : CVE-2015-5292

CVE.ORG link : CVE-2015-5292


JSON object : View

Products Affected

fedoraproject

  • sssd
CWE
CWE-399

Resource Management Errors