Lucene search

K
mageiaGentoo FoundationMGASA-2014-0101
HistoryFeb 26, 2014 - 1:59 a.m.

Updated oath-toolkit packages fix security vulnerability

2014-02-2601:59:23
Gentoo Foundation
advisories.mageia.org
15

0.002 Low

EPSS

Percentile

51.4%

It was found that comments (lines starting with a hash) in /etc/users.oath could prevent one-time-passwords (OTP) from being invalidated, leaving the OTP vulnerable to replay attacks (CVE-2013-7322).

0.002 Low

EPSS

Percentile

51.4%