Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4966

Опубликовано: 12 мар. 2013
Источник: debian
EPSS Низкий

Описание

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freeradiusfixed2.1.12+dfsg-1.2package
freeradiusno-dsasqueezepackage

EPSS

Процентиль: 60%
0.00398
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

redhat
почти 14 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

nvd
больше 12 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

github
больше 3 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

oracle-oval
больше 12 лет назад

ELSA-2013-0134: freeradius2 security and bug fix update (LOW)

EPSS

Процентиль: 60%
0.00398
Низкий