Credentials management in FreeRADIUS - CVE-2011-4966

 

Credentials management in FreeRADIUS - CVE-2011-4966

Published: March 13, 2013 / Updated: August 11, 2020


Vulnerability identifier: #VU43009
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2011-4966
CWE-ID: CWE-255
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
FreeRADIUS
Software vendor:
FreeRADIUS Server Project

Description

The vulnerability allows a remote #AU# to read and manipulate data.

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.


Remediation

Install update from vendor's website.

External links