Bug 661163 (CVE-2010-4341)

Summary: CVE-2010-4341 sssd: DoS in sssd PAM responder can prevent logins
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jgalipea, jlieskov, kbanerje, prc, sbose, security-response-team, sgallagh, ssorce
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: sssd 1.5.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-07-21 14:15:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 668888, 688248, 688250    
Bug Blocks:    
Attachments:
Description Flags
Patch for RHEL5 and RHEL6
none
Patch for Fedora 13
none
Patch for Fedora 14 none

Description Vincent Danen 2010-12-07 23:37:44 UTC
Sebastian Krahmer discovered that it was possible to make sssd hang forever inside a loop in the pam_parse_in_data_v2() function of SSSD's PAM responder by using a carefully crafted packet to sssd.  This could be exploited by a local attacker to crash sssd and prevent other legitimate users from logging into the system.

Acknowledgements:

Red Hat would like to thank Sebastian Krahmer for reporting this issue.

Comment 7 Stephen Gallagher 2010-12-17 20:39:26 UTC
Created attachment 469438 [details]
Patch for RHEL5 and RHEL6

This patch applies to the SSSD 1.2.x branch and will resolve the issue on RHEL 5 and RHEL 6.

Comment 8 Stephen Gallagher 2010-12-17 20:40:12 UTC
Created attachment 469439 [details]
Patch for Fedora 13

This patch applies to the SSSD 1.3 branch and will resolve the issue on Fedora 13.

Comment 9 Stephen Gallagher 2010-12-17 20:40:56 UTC
Created attachment 469440 [details]
Patch for Fedora 14

This patch applies to the SSSD 1.4.x branch and will resolve the issue on Fedora 14.

Comment 10 Vincent Danen 2010-12-17 21:12:15 UTC
Thanks for the patches.  I'm going to pass these on to other vendors and coordinate an unembargo date.

Comment 18 Vincent Danen 2011-01-11 22:38:38 UTC
Created sssd tracking bugs for this issue

Affects: fedora-all [bug 668888]

Comment 19 Vincent Danen 2011-01-11 22:40:41 UTC
Statement:

(none)

Comment 25 Kaushik Banerjee 2011-04-12 12:15:46 UTC
Verified with Sumit's reproducer script.
The script hangs on running on RHEL 6.0 32-bit (sssd-1.2.1-28) and sssd_pam consumes 100% cpu.

The script works fine on running on RHEL 6.1 32 bit (sssd-1.5.1-25).

Verified on version:
# rpm -qi sssd | head
Name        : sssd                         Relocations: (not relocatable)
Version     : 1.5.1                             Vendor: Red Hat, Inc.
Release     : 25.el6                        Build Date: Fri 08 Apr 2011 10:53:37 PM IST
Install Date: Tue 12 Apr 2011 11:01:14 AM IST      Build Host: x86-002.build.bos.redhat.com
Group       : Applications/System           Source RPM: sssd-1.5.1-25.el6.src.rpm
Size        : 3582701                          License: GPLv3+
Signature   : (none)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
URL         : http://fedorahosted.org/sssd/
Summary     : System Security Services Daemon

Comment 26 errata-xmlrpc 2011-05-19 11:40:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0560 https://rhn.redhat.com/errata/RHSA-2011-0560.html

Comment 27 errata-xmlrpc 2011-05-19 13:09:01 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0560 https://rhn.redhat.com/errata/RHSA-2011-0560.html

Comment 28 Vincent Danen 2011-07-07 15:02:03 UTC
This was corrected in upstream sssd version 1.5.1:

https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.1

Comment 29 Stephen Gallagher 2011-07-07 15:29:49 UTC
Why was this BZ reopened?

Comment 30 Vincent Danen 2011-07-07 16:40:03 UTC
It was never closed, and it is still unresolved in Red Hat Enterprise Linux 5.  SRT bugs shouldn't be in VERIFIED state, so I just flipped the state back to NEW where it is supposed to be.

Comment 31 errata-xmlrpc 2011-07-21 08:09:08 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0975 https://rhn.redhat.com/errata/RHSA-2011-0975.html

Comment 32 errata-xmlrpc 2011-07-21 11:45:55 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0975 https://rhn.redhat.com/errata/RHSA-2011-0975.html