A security issue has been reported in SSSD, which can be exploited by malicious people to bypass certain security restrictions.
The security issue exists when performing authentication with an LDAP server through a service that utilizes pam_authenticate. This can be exploited to login as an arbitrary user by providing an empty password.
Successful exploitation requires the LDAP server to allow unauthenticated binds.
The security issue is reported in version 1.3.0. Other versions may also be affected.
Solution: Update to version 1.3.1.
Provided and/or discovered by: The vendor credits Ted Brunell.
Original Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2940
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org