modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0134.html | vendor-advisory x_refsource_REDHAT |
http://rhn.redhat.com/errata/RHBA-2012-0881.html | x_refsource_MISC |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html | vendor-advisory x_refsource_SUSE |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html | vendor-advisory x_refsource_SUSE |
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0134.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://rhn.redhat.com/errata/RHBA-2012-0881.html | x_refsource_MISC x_transferred |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html | vendor-advisory x_refsource_SUSE x_transferred |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html | vendor-advisory x_refsource_SUSE x_transferred |
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | x_refsource_CONFIRM x_transferred |
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.0 | MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
Hyperlink | Source | Resource |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html | secalert@redhat.com | N/A |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html | secalert@redhat.com | N/A |
http://rhn.redhat.com/errata/RHBA-2012-0881.html | secalert@redhat.com | N/A |
http://rhn.redhat.com/errata/RHSA-2013-0134.html | secalert@redhat.com | Patch Vendor Advisory |
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | secalert@redhat.com | N/A |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html | af854a3a-2127-422b-91ae-364da2661108 | N/A |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html | af854a3a-2127-422b-91ae-364da2661108 | N/A |
http://rhn.redhat.com/errata/RHBA-2012-0881.html | af854a3a-2127-422b-91ae-364da2661108 | N/A |
http://rhn.redhat.com/errata/RHSA-2013-0134.html | af854a3a-2127-422b-91ae-364da2661108 | Patch Vendor Advisory |
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | af854a3a-2127-422b-91ae-364da2661108 | N/A |