Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-5292


Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.


Published

2015-10-29T16:59:00.117

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-399

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fedoraproject sssd 1.10.0 Yes
Application fedoraproject sssd 1.10.1 Yes
Application fedoraproject sssd 1.11.0 Yes
Application fedoraproject sssd 1.11.1 Yes
Application fedoraproject sssd 1.11.2 Yes
Application fedoraproject sssd 1.11.3 Yes
Application fedoraproject sssd 1.11.4 Yes
Application fedoraproject sssd 1.11.5 Yes
Application fedoraproject sssd 1.11.6 Yes
Application fedoraproject sssd 1.11.7 Yes
Application fedoraproject sssd 1.12.0 Yes
Application fedoraproject sssd 1.12.1 Yes
Application fedoraproject sssd 1.12.2 Yes
Application fedoraproject sssd 1.12.3 Yes
Application fedoraproject sssd 1.12.4 Yes
Application fedoraproject sssd 1.12.5 Yes
Application fedoraproject sssd 1.13.0 Yes

References