Total vulnerabilities in the database
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
redhat / enterprise_linux_server_aus | 7.4 | 7.4.x |
redhat / enterprise_linux_server_eus | 7.4 | 7.4.x |
redhat / enterprise_linux_server_eus | 7.5 | 7.5.x |
fedoraproject / sssd | - | 1.16.0 |