Scientific Linux Security Update : realmd on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A flaw was found in the way realmd parsed certain input when writing
configuration into the sssd.conf or smb.conf file. A remote attacker
could use this flaw to inject arbitrary configurations into these
files via a newline character in an LDAP response. (CVE-2015-2704)

It was found that the realm client would try to automatically join an
active directory domain without authentication, which could
potentially lead to privilege escalation within a specified domain.

The realmd packages have been upgraded to upstream version 0.16.1,
which provides a number of bug fixes and enhancements over the
previous version.

This update also fixes the following bugs :

- Joining a Scientific Linux machine to a domain using the
realm utility creates /home/domainname/[username]/
directories for domain users. Previously, SELinux
labeled the domain users' directories incorrectly. As a
consequence, the domain users sometimes experienced
problems with SELinux policy. This update modifies the
realmd service default behavior so that the domain
users' directories are compatible with the standard
SELinux policy.

- Previously, the realm utility was unable to join or
discover domains with domain names containing underscore
(_). The realmd service has been modified to process
underscores in domain names correctly, which fixes the
described bug.

In addition, this update adds the following enhancement :

- The realmd utility now allows the user to disable
automatic ID mapping from the command line. To disable
the mapping, pass the '--automatic-id- mapping=no'
option to the realmd utility.

See also :

Solution :

Update the affected realmd, realmd-debuginfo and / or
realmd-devel-docs packages.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87571 ()

Bugtraq ID:

CVE ID: CVE-2015-2704

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now