Improper Authentication Affecting sssd package, versions *


Severity

Recommended
low

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU2410-SSSD-8196875
  • published15 Oct 2024
  • disclosed22 Jun 2023

Introduced: 22 Jun 2023

CVE-2023-3326  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:24.10 sssd.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sssd package and not the sssd package as distributed by Ubuntu. See How to fix? for Ubuntu:24.10 relevant fixed versions and status.

pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.

CVSS Scores

version 3.1