Vulnerability Details : CVE-2013-0287
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
Products affected by CVE-2013-0287
- cpe:2.3:a:fedoraproject:sssd:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-0287
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-0287
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST |
CWE ids for CVE-2013-0287
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0287
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6569d57e3bc168e6e83d70333b48c5cb43aa04c4
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938
910938 – (CVE-2013-0287) CVE-2013-0287 sssd: simple access provider flaw prevents intended ACL use when client to an AD provider
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://www.securityfocus.com/bid/58593
SSSD CVE-2013-0287 Remote Security Bypass Vulnerability
-
https://lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.html
404 Not Found
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=b63830b142053f99bfe954d4be5a2b0f68ce3a93
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html
openSUSE-SU-2013:0559-1: moderate: sssd: fixed some access control manag
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=26590d31f492dbbd36be6d0bde46a4bd3b221edb
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=6837eee3f7f81c0ee454d3718d67d7f3cc6b48ef
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
-
http://rhn.redhat.com/errata/RHSA-2013-0663.html
RHSA-2013:0663 - Security Advisory - Red Hat Customer Portal
-
http://securitytracker.com/id?1028317
System Security Services Daemon (SSSD) Access Control Flaw Lets Remote Users Bypass Access Controls in Certain Configurations - SecurityTracker
-
http://git.fedorahosted.org/cgit/sssd.git/patch/?id=7619be9f6bf649665fcbeee9e6b120f9f9cba2a5
Infrastructure/Fedorahosted-retirement - Fedora Project WikiPatch
Jump to