Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
References
Configurations
Configuration 1 (hide)
|
History
13 Feb 2023, 00:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication. |
02 Feb 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in. |
Information
Published : 2015-10-29 16:59
Updated : 2023-12-10 11:46
NVD link : CVE-2015-5292
Mitre link : CVE-2015-5292
CVE.ORG link : CVE-2015-5292
JSON object : View
Products Affected
fedoraproject
- sssd
CWE
CWE-399
Resource Management Errors