Unrated severityNVD Advisory· Published Mar 21, 2013· Updated Apr 29, 2026
CVE-2013-0287
CVE-2013-0287
Description
The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
Affected products
5cpe:2.3:a:fedoraproject:sssd:1.9.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:fedoraproject:sssd:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:sssd:1.9.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/52704nvdVendor Advisory
- secunia.com/advisories/52722nvdVendor Advisory
- bugzilla.redhat.com/bugzilla/show_bug.cginvd
- lists.opensuse.org/opensuse-updates/2013-03/msg00115.htmlnvd
- rhn.redhat.com/errata/RHSA-2013-0663.htmlnvd
- securitytracker.com/idnvd
- www.securityfocus.com/bid/58593nvd
- lists.fedorahosted.org/pipermail/sssd-devel/2013-March/014066.htmlnvd
News mentions
0No linked articles in our index yet.