{ "schema_version": "1.4.0", "id": "GHSA-qfqv-cr9x-27pg", "modified": "2022-05-17T02:04:28Z", "published": "2022-05-17T02:04:28Z", "aliases": [ "CVE-2010-4341" ], "details": "The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4341" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661163" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64881" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/43053" }, { "type": "WEB", "url": "http://secunia.com/advisories/43055" }, { "type": "WEB", "url": "http://secunia.com/advisories/43068" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0560.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0975.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/45961" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0197" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0212" } ], "database_specific": { "cwe_ids": [], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-01-25T01:00:00Z" } }