Vulnerabilities > Fedoraproject > Sssd > Medium

DATE CVE VULNERABILITY TITLE RISK
2019-12-26 CVE-2012-3462 Improper Authentication vulnerability in Fedoraproject Sssd 1.9.0
A flaw was found in SSSD version 1.9.0.
network
low complexity
fedoraproject CWE-287
6.5
2019-03-25 CVE-2018-16838 Improper Privilege Management vulnerability in multiple products
A flaw was found in sssd Group Policy Objects implementation.
network
low complexity
fedoraproject redhat CWE-269
5.4
2019-01-15 CVE-2019-3811 A vulnerability was found in sssd. 5.2
2018-07-27 CVE-2017-12173 Improper Input Validation vulnerability in multiple products
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection.
network
low complexity
redhat fedoraproject CWE-20
4.0
2018-06-26 CVE-2018-10852 Information Exposure vulnerability in multiple products
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user.
network
low complexity
debian fedoraproject redhat CWE-200
5.0
2013-03-21 CVE-2013-0287 Permissions, Privileges, and Access Controls vulnerability in Fedoraproject Sssd
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
4.9
2010-08-30 CVE-2010-2940 Improper Authentication vulnerability in Fedoraproject Sssd 1.3.0
The auth_send function in providers/ldap/ldap_auth.c in System Security Services Daemon (SSSD) 1.3.0, when LDAP authentication and anonymous bind are enabled, allows remote attackers to bypass the authentication requirements of pam_authenticate via an empty password.
network
high complexity
fedoraproject CWE-287
5.1