Hide Forgot
Multiple out-of-buffer bounds read flaws were found in the way autofs and ssh service responders of sssd, a System Security Services Daemon, performed parsing of SSSD packet values. An attacker could provide a specially-crafted packet that, when processed by the autofs or ssh service responders of sssd would lead to sssd server crash (temporary denial of service). This issue was found by Florian Weimer of Red Hat Product Security Team.
This issue did NOT affect the version of the sssd package, as shipped with Red Hat Enterprise Linux 5 as it did not include support for autofs and ssh responders yet. -- This issue affects the version of the sssd package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects versions of the sssd package, as shipped with Fedora release of 16 and 17. -- This issue did NOT affect the version of the sssd package, as shipped with Fedora EPEL 5 as it did not include support for autofs and ssh responders yet.
Created attachment 658700 [details] Proposed patch by Jan Cholasta
This issue has been assigned CVE-2013-0220
Created sssd tracking bugs for this issue Affects: fedora-all [bug 903145]
sssd-1.9.4-2.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
Acknowledgements: These issues were discovered by Florian Weimer of the Red Hat Product Security Team.
sssd-1.8.6-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0508 https://rhn.redhat.com/errata/RHSA-2013-0508.html