CVE-2018-10852

Impact:
Low
Public Date:
2018-06-26
CWE:
CWE-200
Bugzilla:
1588810: CVE-2018-10852 sssd: information leak from the sssd-sudo responder
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD utilizes too broad of a set of permissions. Any user who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user.

Find out more about CVE-2018-10852 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 3.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Changed
Confidentiality Low
Integrity Impact None
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Satellite 6 sssd Affected
Red Hat Enterprise Linux 7 sssd Affected
Red Hat Enterprise Linux 6 sssd Will not fix
Red Hat Enterprise Linux 5 sssd Will not fix

Acknowledgements

This issue was discovered by Jakub Hrozek (Red Hat).

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.