Описание
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.1.12+dfsg-1.2ubuntu7 |
hardy | ignored | end of life |
lucid | released | 2.1.8+dfsg-1ubuntu1.1 |
oneiric | ignored | end of life |
precise | released | 2.1.10+dfsg-3ubuntu0.12.04.2 |
quantal | released | 2.1.12+dfsg-1.1ubuntu0.1 |
raring | ignored | end of life |
saucy | not-affected | 2.1.12+dfsg-1.2ubuntu5 |
upstream | released | 2.1.12+dfsg-1.2 |
Показывать по
6 Medium
CVSS2
Связанные уязвимости
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode ...
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
ELSA-2013-0134: freeradius2 security and bug fix update (LOW)
6 Medium
CVSS2