Vulnerability Description
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Sssd | 1.9.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2012-3462Broken LinkThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462ExploitIssue TrackingPatch
- https://pagure.io/SSSD/sssd/issue/1470ExploitIssue TrackingThird Party Advisory
- https://access.redhat.com/security/cve/cve-2012-3462Broken LinkThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462ExploitIssue TrackingPatch
- https://pagure.io/SSSD/sssd/issue/1470ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2012-3462?
CVE-2012-3462 is a vulnerability with a CVSS score of 8.8 (HIGH). A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of...
How severe is CVE-2012-3462?
CVE-2012-3462 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3462?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Sssd.