Bug 514057 (CVE-2009-2410)
Summary: | CVE-2009-2410 If internal sssd user has no password set, the user can ssh to the sssd client with any supplied password | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Jenny Severance <jgalipea> | ||||||
Component: | sssd | Assignee: | Stephen Gallagher <sgallagh> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
Severity: | urgent | Docs Contact: | |||||||
Priority: | urgent | ||||||||
Version: | 11 | CC: | bressers, jhrozek, sbose, security-response-team, sgallagh, ssorce | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | 0.4.1-3.fc11 | Doc Type: | Bug Fix | ||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2009-07-29 21:32:10 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Jenny Severance
2009-07-27 19:15:09 UTC
Ok, this is a bit of a tricky bug to reproduce. The described behavior is unique to i586 (it does not occur on x86_64 systems). Furthermore the bug only occurs when running the sssd daemonized (with the -D option). It does not manifest when running in debug mode. Further investigation is needed. Created attachment 355410 [details]
Patch to ensure proper return from password check
Ok, I've tracked down the issue here. In the LOCAL authentication check, we evaluate whether the LOCAL backend has a password set for the user. It looks like there was a copy-paste error that resulted in us returning early from the authentication evaluation with a success code instead of an error code. I have now corrected it so that we explicitly set the return code to LDB_ERR_NO_SUCH_ATTRIBUTE when the password is missing.
Could someone from the security response team please review the attached patch? It should apply cleanly against the SSSD 0.4.1 SRPM sources in CVS.
Created attachment 355424 [details]
Patch to ensure proper return from password check
Replacing old patch with new one that lists CVE in the commit message.
Built in Koji, submitted for stable. http://koji.fedoraproject.org/koji/buildinfo?buildID=124518 sssd-0.4.1-3.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. |