Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 25 Mar 2015 14:16:48 +0100
From: Sebastian Krahmer <krahmer@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVS-Request: realmd code execution/auth bypass


CVE-Request indeed :D


On Wed, Mar 25, 2015 at 01:54:38PM +0100, Sebastian Krahmer wrote:
> Hi
> 
> Upstream has opened two bugs for issues in realmd that
> could lead to remote attackers logging into the local system
> by placing an evil AD server in the LAN or by offering \r in
> LDAP responses that are treated by sssd and winbind as newline
> separator; therefore allowing to smuggle options into the config
> files used for startup:
> 
> https://bugs.freedesktop.org/show_bug.cgi?id=89205
> https://bugs.freedesktop.org/show_bug.cgi?id=89207
> 
> Sebastian
> 
> 
> -- 
> 
> ~ perl self.pl
> ~ $_='print"\$_=\47$_\47;eval"';eval
> ~ krahmer@...e.de - SuSE Security Team

-- 

~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ