RHSA-2011:0975

Vulnerability from csaf_redhat - Published: 2011-07-21 08:04 - Updated: 2025-11-21 17:38
Summary
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
Severity
Low
Notes
Topic: Updated sssd packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details: The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. It provides an NSS and PAM interface toward the system and a pluggable back-end system to connect to multiple different account sources. It is also the basis to provide client auditing and policy services for projects such as FreeIPA. A flaw was found in the SSSD PAM responder that could allow a local attacker to force SSSD to enter an infinite loop via a carefully-crafted packet. With SSSD unresponsive, legitimate users could be denied the ability to log in to the system. (CVE-2010-4341) Red Hat would like to thank Sebastian Krahmer for reporting this issue. These updated sssd packages include a number of bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for information about these changes: https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/sssd.html#RHSA-2011-0975 All sssd users are advised to upgrade to these updated sssd packages, which upgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the bugs and add the enhancements noted in the Technical Notes.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0975
References
https://access.redhat.com/errata/RHSA-2011:0975 self
https://access.redhat.com/security/updates/classi… external
https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.1 external
https://docs.redhat.com/docs/en-US/Red_Hat_Enterp… external
https://bugzilla.redhat.com/show_bug.cgi?id=640601 external
https://bugzilla.redhat.com/show_bug.cgi?id=661163 external
https://bugzilla.redhat.com/show_bug.cgi?id=675007 external
https://bugzilla.redhat.com/show_bug.cgi?id=676027 external
https://bugzilla.redhat.com/show_bug.cgi?id=678032 external
https://bugzilla.redhat.com/show_bug.cgi?id=678092 external
https://bugzilla.redhat.com/show_bug.cgi?id=678412 external
https://bugzilla.redhat.com/show_bug.cgi?id=678606 external
https://bugzilla.redhat.com/show_bug.cgi?id=678615 external
https://bugzilla.redhat.com/show_bug.cgi?id=678778 external
https://bugzilla.redhat.com/show_bug.cgi?id=678780 external
https://bugzilla.redhat.com/show_bug.cgi?id=679087 external
https://bugzilla.redhat.com/show_bug.cgi?id=679097 external
https://bugzilla.redhat.com/show_bug.cgi?id=682803 external
https://bugzilla.redhat.com/show_bug.cgi?id=682808 external
https://bugzilla.redhat.com/show_bug.cgi?id=682853 external
https://bugzilla.redhat.com/show_bug.cgi?id=683260 external
https://bugzilla.redhat.com/show_bug.cgi?id=688677 external
https://bugzilla.redhat.com/show_bug.cgi?id=688694 external
https://bugzilla.redhat.com/show_bug.cgi?id=688697 external
https://bugzilla.redhat.com/show_bug.cgi?id=689887 external
https://bugzilla.redhat.com/show_bug.cgi?id=690093 external
https://bugzilla.redhat.com/show_bug.cgi?id=690096 external
https://bugzilla.redhat.com/show_bug.cgi?id=690287 external
https://bugzilla.redhat.com/show_bug.cgi?id=690814 external
https://bugzilla.redhat.com/show_bug.cgi?id=690867 external
https://bugzilla.redhat.com/show_bug.cgi?id=691900 external
https://bugzilla.redhat.com/show_bug.cgi?id=692960 external
https://bugzilla.redhat.com/show_bug.cgi?id=694149 external
https://bugzilla.redhat.com/show_bug.cgi?id=694853 external
https://bugzilla.redhat.com/show_bug.cgi?id=695476 external
https://bugzilla.redhat.com/show_bug.cgi?id=696979 external
https://bugzilla.redhat.com/show_bug.cgi?id=701702 external
https://bugzilla.redhat.com/show_bug.cgi?id=707340 external
https://bugzilla.redhat.com/show_bug.cgi?id=707574 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2010-4341 self
https://bugzilla.redhat.com/show_bug.cgi?id=661163 external
https://www.cve.org/CVERecord?id=CVE-2010-4341 external
https://nvd.nist.gov/vuln/detail/CVE-2010-4341 external
Acknowledgments
Sebastian Krahmer

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated sssd packages that fix one security issue, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The System Security Services Daemon (SSSD) provides a set of daemons to\nmanage access to remote directories and authentication mechanisms. It\nprovides an NSS and PAM interface toward the system and a pluggable\nback-end system to connect to multiple different account sources. It is\nalso the basis to provide client auditing and policy services for projects\nsuch as FreeIPA.\n\nA flaw was found in the SSSD PAM responder that could allow a local\nattacker to force SSSD to enter an infinite loop via a carefully-crafted\npacket. With SSSD unresponsive, legitimate users could be denied the\nability to log in to the system. (CVE-2010-4341)\n\nRed Hat would like to thank Sebastian Krahmer for reporting this issue.\n\nThese updated sssd packages include a number of bug fixes and enhancements.\nSpace precludes documenting all of these changes in this advisory. Refer to\nthe Red Hat Enterprise Linux 5.7 Technical Notes for information about\nthese changes:\n\nhttps://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/sssd.html#RHSA-2011-0975\n\nAll sssd users are advised to upgrade to these updated sssd packages, which\nupgrade SSSD to upstream version 1.5.1 to correct this issue, and fix the\nbugs and add the enhancements noted in the Technical Notes.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0975",
        "url": "https://access.redhat.com/errata/RHSA-2011:0975"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.1",
        "url": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.1"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/sssd.html#RHSA-2011-0975",
        "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/sssd.html#RHSA-2011-0975"
      },
      {
        "category": "external",
        "summary": "640601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640601"
      },
      {
        "category": "external",
        "summary": "661163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661163"
      },
      {
        "category": "external",
        "summary": "675007",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675007"
      },
      {
        "category": "external",
        "summary": "676027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676027"
      },
      {
        "category": "external",
        "summary": "678032",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678032"
      },
      {
        "category": "external",
        "summary": "678092",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678092"
      },
      {
        "category": "external",
        "summary": "678412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678412"
      },
      {
        "category": "external",
        "summary": "678606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678606"
      },
      {
        "category": "external",
        "summary": "678615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678615"
      },
      {
        "category": "external",
        "summary": "678778",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678778"
      },
      {
        "category": "external",
        "summary": "678780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678780"
      },
      {
        "category": "external",
        "summary": "679087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679087"
      },
      {
        "category": "external",
        "summary": "679097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679097"
      },
      {
        "category": "external",
        "summary": "682803",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682803"
      },
      {
        "category": "external",
        "summary": "682808",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682808"
      },
      {
        "category": "external",
        "summary": "682853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682853"
      },
      {
        "category": "external",
        "summary": "683260",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683260"
      },
      {
        "category": "external",
        "summary": "688677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688677"
      },
      {
        "category": "external",
        "summary": "688694",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688694"
      },
      {
        "category": "external",
        "summary": "688697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688697"
      },
      {
        "category": "external",
        "summary": "689887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689887"
      },
      {
        "category": "external",
        "summary": "690093",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690093"
      },
      {
        "category": "external",
        "summary": "690096",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690096"
      },
      {
        "category": "external",
        "summary": "690287",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690287"
      },
      {
        "category": "external",
        "summary": "690814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690814"
      },
      {
        "category": "external",
        "summary": "690867",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690867"
      },
      {
        "category": "external",
        "summary": "691900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691900"
      },
      {
        "category": "external",
        "summary": "692960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692960"
      },
      {
        "category": "external",
        "summary": "694149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694149"
      },
      {
        "category": "external",
        "summary": "694853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694853"
      },
      {
        "category": "external",
        "summary": "695476",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695476"
      },
      {
        "category": "external",
        "summary": "696979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696979"
      },
      {
        "category": "external",
        "summary": "701702",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=701702"
      },
      {
        "category": "external",
        "summary": "707340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=707340"
      },
      {
        "category": "external",
        "summary": "707574",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=707574"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0975.json"
      }
    ],
    "title": "Red Hat Security Advisory: sssd security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-11-21T17:38:32+00:00",
      "generator": {
        "date": "2025-11-21T17:38:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "RHSA-2011:0975",
      "initial_release_date": "2011-07-21T08:04:00+00:00",
      "revision_history": [
        {
          "date": "2011-07-21T08:04:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-07-21T04:09:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-21T17:38:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.x86_64",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.x86_64",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.x86_64",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.x86_64",
                  "product_id": "sssd-client-0:1.5.1-37.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.x86_64",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.x86_64",
                  "product_id": "sssd-0:1.5.1-37.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-tools-0:1.5.1-37.el5.x86_64",
                "product": {
                  "name": "sssd-tools-0:1.5.1-37.el5.x86_64",
                  "product_id": "sssd-tools-0:1.5.1-37.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-tools@1.5.1-37.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.i386",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.i386",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.i386",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.i386",
                  "product_id": "sssd-client-0:1.5.1-37.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.i386",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.i386",
                  "product_id": "sssd-0:1.5.1-37.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-tools-0:1.5.1-37.el5.i386",
                "product": {
                  "name": "sssd-tools-0:1.5.1-37.el5.i386",
                  "product_id": "sssd-tools-0:1.5.1-37.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-tools@1.5.1-37.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.src",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.src",
                  "product_id": "sssd-0:1.5.1-37.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.ia64",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.ia64",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.ia64",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.ia64",
                  "product_id": "sssd-client-0:1.5.1-37.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.ia64",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.ia64",
                  "product_id": "sssd-0:1.5.1-37.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-tools-0:1.5.1-37.el5.ia64",
                "product": {
                  "name": "sssd-tools-0:1.5.1-37.el5.ia64",
                  "product_id": "sssd-tools-0:1.5.1-37.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-tools@1.5.1-37.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc64",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc64",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.ppc64",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.ppc64",
                  "product_id": "sssd-client-0:1.5.1-37.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.ppc",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.ppc",
                  "product_id": "sssd-client-0:1.5.1-37.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.ppc",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.ppc",
                  "product_id": "sssd-0:1.5.1-37.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-tools-0:1.5.1-37.el5.ppc",
                "product": {
                  "name": "sssd-tools-0:1.5.1-37.el5.ppc",
                  "product_id": "sssd-tools-0:1.5.1-37.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-tools@1.5.1-37.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.s390x",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.s390x",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.s390x",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.s390x",
                  "product_id": "sssd-client-0:1.5.1-37.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-0:1.5.1-37.el5.s390x",
                "product": {
                  "name": "sssd-0:1.5.1-37.el5.s390x",
                  "product_id": "sssd-0:1.5.1-37.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd@1.5.1-37.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-tools-0:1.5.1-37.el5.s390x",
                "product": {
                  "name": "sssd-tools-0:1.5.1-37.el5.s390x",
                  "product_id": "sssd-tools-0:1.5.1-37.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-tools@1.5.1-37.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sssd-debuginfo-0:1.5.1-37.el5.s390",
                "product": {
                  "name": "sssd-debuginfo-0:1.5.1-37.el5.s390",
                  "product_id": "sssd-debuginfo-0:1.5.1-37.el5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-debuginfo@1.5.1-37.el5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "sssd-client-0:1.5.1-37.el5.s390",
                "product": {
                  "name": "sssd-client-0:1.5.1-37.el5.s390",
                  "product_id": "sssd-client-0:1.5.1-37.el5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/sssd-client@1.5.1-37.el5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.src"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.ppc64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.s390"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-client-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-debuginfo-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-tools-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-tools-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-tools-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-tools-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:sssd-tools-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.src"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.ppc64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.s390"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-client-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-client-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-client-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-debuginfo-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-debuginfo-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-debuginfo-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-tools-0:1.5.1-37.el5.i386"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-tools-0:1.5.1-37.el5.ia64"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-tools-0:1.5.1-37.el5.ppc"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-tools-0:1.5.1-37.el5.s390x"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sssd-tools-0:1.5.1-37.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:sssd-tools-0:1.5.1-37.el5.x86_64"
        },
        "product_reference": "sssd-tools-0:1.5.1-37.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Sebastian Krahmer"
          ]
        }
      ],
      "cve": "CVE-2010-4341",
      "discovery_date": "2010-12-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "661163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "sssd: DoS in sssd PAM responder can prevent logins",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:sssd-0:1.5.1-37.el5.i386",
          "5Client:sssd-0:1.5.1-37.el5.ia64",
          "5Client:sssd-0:1.5.1-37.el5.ppc",
          "5Client:sssd-0:1.5.1-37.el5.s390x",
          "5Client:sssd-0:1.5.1-37.el5.src",
          "5Client:sssd-0:1.5.1-37.el5.x86_64",
          "5Client:sssd-client-0:1.5.1-37.el5.i386",
          "5Client:sssd-client-0:1.5.1-37.el5.ia64",
          "5Client:sssd-client-0:1.5.1-37.el5.ppc",
          "5Client:sssd-client-0:1.5.1-37.el5.ppc64",
          "5Client:sssd-client-0:1.5.1-37.el5.s390",
          "5Client:sssd-client-0:1.5.1-37.el5.s390x",
          "5Client:sssd-client-0:1.5.1-37.el5.x86_64",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.i386",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.ia64",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390x",
          "5Client:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
          "5Client:sssd-tools-0:1.5.1-37.el5.i386",
          "5Client:sssd-tools-0:1.5.1-37.el5.ia64",
          "5Client:sssd-tools-0:1.5.1-37.el5.ppc",
          "5Client:sssd-tools-0:1.5.1-37.el5.s390x",
          "5Client:sssd-tools-0:1.5.1-37.el5.x86_64",
          "5Server:sssd-0:1.5.1-37.el5.i386",
          "5Server:sssd-0:1.5.1-37.el5.ia64",
          "5Server:sssd-0:1.5.1-37.el5.ppc",
          "5Server:sssd-0:1.5.1-37.el5.s390x",
          "5Server:sssd-0:1.5.1-37.el5.src",
          "5Server:sssd-0:1.5.1-37.el5.x86_64",
          "5Server:sssd-client-0:1.5.1-37.el5.i386",
          "5Server:sssd-client-0:1.5.1-37.el5.ia64",
          "5Server:sssd-client-0:1.5.1-37.el5.ppc",
          "5Server:sssd-client-0:1.5.1-37.el5.ppc64",
          "5Server:sssd-client-0:1.5.1-37.el5.s390",
          "5Server:sssd-client-0:1.5.1-37.el5.s390x",
          "5Server:sssd-client-0:1.5.1-37.el5.x86_64",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.i386",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.ia64",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390x",
          "5Server:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
          "5Server:sssd-tools-0:1.5.1-37.el5.i386",
          "5Server:sssd-tools-0:1.5.1-37.el5.ia64",
          "5Server:sssd-tools-0:1.5.1-37.el5.ppc",
          "5Server:sssd-tools-0:1.5.1-37.el5.s390x",
          "5Server:sssd-tools-0:1.5.1-37.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4341"
        },
        {
          "category": "external",
          "summary": "RHBZ#661163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4341"
        }
      ],
      "release_date": "2011-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-21T08:04:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "5Client:sssd-0:1.5.1-37.el5.i386",
            "5Client:sssd-0:1.5.1-37.el5.ia64",
            "5Client:sssd-0:1.5.1-37.el5.ppc",
            "5Client:sssd-0:1.5.1-37.el5.s390x",
            "5Client:sssd-0:1.5.1-37.el5.src",
            "5Client:sssd-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-client-0:1.5.1-37.el5.i386",
            "5Client:sssd-client-0:1.5.1-37.el5.ia64",
            "5Client:sssd-client-0:1.5.1-37.el5.ppc",
            "5Client:sssd-client-0:1.5.1-37.el5.ppc64",
            "5Client:sssd-client-0:1.5.1-37.el5.s390",
            "5Client:sssd-client-0:1.5.1-37.el5.s390x",
            "5Client:sssd-client-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.i386",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ia64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390x",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-tools-0:1.5.1-37.el5.i386",
            "5Client:sssd-tools-0:1.5.1-37.el5.ia64",
            "5Client:sssd-tools-0:1.5.1-37.el5.ppc",
            "5Client:sssd-tools-0:1.5.1-37.el5.s390x",
            "5Client:sssd-tools-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-0:1.5.1-37.el5.i386",
            "5Server:sssd-0:1.5.1-37.el5.ia64",
            "5Server:sssd-0:1.5.1-37.el5.ppc",
            "5Server:sssd-0:1.5.1-37.el5.s390x",
            "5Server:sssd-0:1.5.1-37.el5.src",
            "5Server:sssd-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-client-0:1.5.1-37.el5.i386",
            "5Server:sssd-client-0:1.5.1-37.el5.ia64",
            "5Server:sssd-client-0:1.5.1-37.el5.ppc",
            "5Server:sssd-client-0:1.5.1-37.el5.ppc64",
            "5Server:sssd-client-0:1.5.1-37.el5.s390",
            "5Server:sssd-client-0:1.5.1-37.el5.s390x",
            "5Server:sssd-client-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.i386",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ia64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390x",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-tools-0:1.5.1-37.el5.i386",
            "5Server:sssd-tools-0:1.5.1-37.el5.ia64",
            "5Server:sssd-tools-0:1.5.1-37.el5.ppc",
            "5Server:sssd-tools-0:1.5.1-37.el5.s390x",
            "5Server:sssd-tools-0:1.5.1-37.el5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0975"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:sssd-0:1.5.1-37.el5.i386",
            "5Client:sssd-0:1.5.1-37.el5.ia64",
            "5Client:sssd-0:1.5.1-37.el5.ppc",
            "5Client:sssd-0:1.5.1-37.el5.s390x",
            "5Client:sssd-0:1.5.1-37.el5.src",
            "5Client:sssd-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-client-0:1.5.1-37.el5.i386",
            "5Client:sssd-client-0:1.5.1-37.el5.ia64",
            "5Client:sssd-client-0:1.5.1-37.el5.ppc",
            "5Client:sssd-client-0:1.5.1-37.el5.ppc64",
            "5Client:sssd-client-0:1.5.1-37.el5.s390",
            "5Client:sssd-client-0:1.5.1-37.el5.s390x",
            "5Client:sssd-client-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.i386",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ia64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.s390x",
            "5Client:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
            "5Client:sssd-tools-0:1.5.1-37.el5.i386",
            "5Client:sssd-tools-0:1.5.1-37.el5.ia64",
            "5Client:sssd-tools-0:1.5.1-37.el5.ppc",
            "5Client:sssd-tools-0:1.5.1-37.el5.s390x",
            "5Client:sssd-tools-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-0:1.5.1-37.el5.i386",
            "5Server:sssd-0:1.5.1-37.el5.ia64",
            "5Server:sssd-0:1.5.1-37.el5.ppc",
            "5Server:sssd-0:1.5.1-37.el5.s390x",
            "5Server:sssd-0:1.5.1-37.el5.src",
            "5Server:sssd-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-client-0:1.5.1-37.el5.i386",
            "5Server:sssd-client-0:1.5.1-37.el5.ia64",
            "5Server:sssd-client-0:1.5.1-37.el5.ppc",
            "5Server:sssd-client-0:1.5.1-37.el5.ppc64",
            "5Server:sssd-client-0:1.5.1-37.el5.s390",
            "5Server:sssd-client-0:1.5.1-37.el5.s390x",
            "5Server:sssd-client-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.i386",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ia64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.ppc64",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.s390x",
            "5Server:sssd-debuginfo-0:1.5.1-37.el5.x86_64",
            "5Server:sssd-tools-0:1.5.1-37.el5.i386",
            "5Server:sssd-tools-0:1.5.1-37.el5.ia64",
            "5Server:sssd-tools-0:1.5.1-37.el5.ppc",
            "5Server:sssd-tools-0:1.5.1-37.el5.s390x",
            "5Server:sssd-tools-0:1.5.1-37.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "sssd: DoS in sssd PAM responder can prevent logins"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…