The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
https://exchange.xforce.ibmcloud.com/vulnerabilities/64881
https://bugzilla.redhat.com/show_bug.cgi?id=661163
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0197
http://www.securityfocus.com/bid/45961
http://www.redhat.com/support/errata/RHSA-2011-0975.html
http://www.redhat.com/support/errata/RHSA-2011-0560.html
http://secunia.com/advisories/43068
http://secunia.com/advisories/43055
http://secunia.com/advisories/43053
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html