Vulnerability Description
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation that has any user's Kerberos ticket-granting ticket (TGT); and might allow remote attackers to bypass intended access restrictions via vectors involving an arbitrary password in conjunction with a valid TGT.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Sssd | <= 1.0.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/38160Vendor Advisory
- http://www.securityfocus.com/bid/37747
- https://bugzilla.redhat.com/show_bug.cgi?id=553233
- https://fedorahosted.org/sssd/wiki/Releases/Notes-1.0.1Patch
- http://secunia.com/advisories/38160Vendor Advisory
- http://www.securityfocus.com/bid/37747
- https://bugzilla.redhat.com/show_bug.cgi?id=553233
- https://fedorahosted.org/sssd/wiki/Releases/Notes-1.0.1Patch
FAQ
What is CVE-2010-0014?
CVE-2010-0014 is a vulnerability with a CVSS score of 3.7 (LOW). System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary passw...
How severe is CVE-2010-0014?
CVE-2010-0014 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-0014?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Sssd.