Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845048
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5067-1)
Summary:The remote host is missing an update for the 'sssd' package(s) announced via the USN-5067-1 advisory.
Description:Summary:
The remote host is missing an update for the 'sssd' package(s) announced via the USN-5067-1 advisory.

Vulnerability Insight:
Jakub Hrozek discovered that SSSD incorrectly handled file permissions. A
local attacker could possibly use this issue to read the sudo rules
available for any user. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10852)

It was discovered that SSSD incorrectly handled Group Policy Objects. When
SSSD is configured with too strict permissions causing the GPO to not be
readable, SSSD will allow all authenticated users to login instead of being
denied, contrary to expectations. This issue only affected Ubuntu 18.04
LTS. (CVE-2018-16838)

It was discovered that SSSD incorrectly handled users with no home
directory set. When no home directory was set, SSSD would return the root
directory instead of an empty string, possibly bypassing security measures.
This issue only affected Ubuntu 18.04 LTS. (CVE-2019-3811)

Cedric Buissart discovered that SSSD incorrectly handled the sssctl
command. In certain environments, a local user could use this issue to
execute arbitrary commands and possibly escalate privileges.
(CVE-2021-3621)

Affected Software/OS:
'sssd' package(s) on Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.04.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-10852
BugTraq ID: 104547
http://www.securityfocus.com/bid/104547
https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html
RedHat Security Advisories: RHSA-2018:3158
https://access.redhat.com/errata/RHSA-2018:3158
Common Vulnerability Exposure (CVE) ID: CVE-2018-16838
RHSA-2019:2177
https://access.redhat.com/errata/RHSA-2019:2177
RHSA-2019:2437
https://access.redhat.com/errata/RHSA-2019:2437
RHSA-2019:3651
https://access.redhat.com/errata/RHSA-2019:3651
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838
openSUSE-SU-2019:1576
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html
openSUSE-SU-2019:1589
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-3811
106644
http://www.securityfocus.com/bid/106644
[debian-lts-announce] 20190117 [SECURITY] [DLA 1635-1] sssd security update
https://lists.debian.org/debian-lts-announce/2019/01/msg00011.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3811
openSUSE-SU-2019:0344
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00026.html
openSUSE-SU-2019:1174
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3621
https://bugzilla.redhat.com/show_bug.cgi?id=1975142
https://sssd.io/release-notes/sssd-2.6.0.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.