This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A flaw was found in the way realmd parsed certain input when writing
configuration into the sssd.conf or smb.conf file. A remote attacker
could use this flaw to inject arbitrary configurations into these
files via a newline character in an LDAP response. (CVE-2015-2704)
It was found that the realm client would try to automatically join an
active directory domain without authentication, which could
potentially lead to privilege escalation within a specified domain.
The realmd packages have been upgraded to upstream version 0.16.1,
which provides a number of bug fixes and enhancements over the
This update also fixes the following bugs :
- Joining a Scientific Linux machine to a domain using the
realm utility creates /home/domainname/[username]/
directories for domain users. Previously, SELinux
labeled the domain users' directories incorrectly. As a
consequence, the domain users sometimes experienced
problems with SELinux policy. This update modifies the
realmd service default behavior so that the domain
users' directories are compatible with the standard
- Previously, the realm utility was unable to join or
discover domains with domain names containing underscore
(_). The realmd service has been modified to process
underscores in domain names correctly, which fixes the
In addition, this update adds the following enhancement :
- The realmd utility now allows the user to disable
automatic ID mapping from the command line. To disable
the mapping, pass the '--automatic-id- mapping=no'
option to the realmd utility.
See also :
Update the affected realmd, realmd-debuginfo and / or
Risk factor :
Medium / CVSS Base Score : 5.0