Lucene search

K
nvd[email protected]NVD:CVE-2011-4966
HistoryMar 12, 2013 - 11:55 p.m.

CVE-2011-4966

2013-03-1223:55:01
CWE-255
web.nvd.nist.gov
5

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

AI Score

6.2

Confidence

Low

EPSS

0.003

Percentile

70.9%

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

Affected configurations

Nvd
Node
freeradiusfreeradius
OR
freeradiusfreeradiusRange2.2.0
OR
freeradiusfreeradiusMatch0.1
OR
freeradiusfreeradiusMatch0.2
OR
freeradiusfreeradiusMatch0.3
OR
freeradiusfreeradiusMatch0.4
OR
freeradiusfreeradiusMatch0.5
OR
freeradiusfreeradiusMatch0.6
OR
freeradiusfreeradiusMatch0.7
OR
freeradiusfreeradiusMatch0.7.1
OR
freeradiusfreeradiusMatch0.8
OR
freeradiusfreeradiusMatch0.8.1
OR
freeradiusfreeradiusMatch0.9
OR
freeradiusfreeradiusMatch0.9.0
OR
freeradiusfreeradiusMatch0.9.1
OR
freeradiusfreeradiusMatch0.9.2
OR
freeradiusfreeradiusMatch0.9.3
OR
freeradiusfreeradiusMatch1.0.0
OR
freeradiusfreeradiusMatch1.0.1
OR
freeradiusfreeradiusMatch1.0.2
OR
freeradiusfreeradiusMatch1.0.3
OR
freeradiusfreeradiusMatch1.0.4
OR
freeradiusfreeradiusMatch1.0.5
OR
freeradiusfreeradiusMatch1.1.0
OR
freeradiusfreeradiusMatch1.1.1
OR
freeradiusfreeradiusMatch1.1.2
OR
freeradiusfreeradiusMatch1.1.3
OR
freeradiusfreeradiusMatch1.1.4
OR
freeradiusfreeradiusMatch1.1.5
OR
freeradiusfreeradiusMatch1.1.6
OR
freeradiusfreeradiusMatch1.1.7
OR
freeradiusfreeradiusMatch1.1.8
OR
freeradiusfreeradiusMatch2.0
OR
freeradiusfreeradiusMatch2.0.1
OR
freeradiusfreeradiusMatch2.0.2
OR
freeradiusfreeradiusMatch2.0.3
OR
freeradiusfreeradiusMatch2.0.4
OR
freeradiusfreeradiusMatch2.0.5
OR
freeradiusfreeradiusMatch2.1.0
OR
freeradiusfreeradiusMatch2.1.1
OR
freeradiusfreeradiusMatch2.1.2
OR
freeradiusfreeradiusMatch2.1.3
OR
freeradiusfreeradiusMatch2.1.4
OR
freeradiusfreeradiusMatch2.1.6
OR
freeradiusfreeradiusMatch2.1.7
OR
freeradiusfreeradiusMatch2.1.8
OR
freeradiusfreeradiusMatch2.1.9
OR
freeradiusfreeradiusMatch2.1.10
OR
freeradiusfreeradiusMatch2.1.11
OR
freeradiusfreeradiusMatch2.1.12
VendorProductVersionCPE
freeradiusfreeradius*cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
freeradiusfreeradius0.1cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*
freeradiusfreeradius0.2cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
freeradiusfreeradius0.3cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
freeradiusfreeradius0.4cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*
freeradiusfreeradius0.5cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*
freeradiusfreeradius0.6cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*
freeradiusfreeradius0.7cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*
freeradiusfreeradius0.7.1cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*
freeradiusfreeradius0.8cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 491

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

AI Score

6.2

Confidence

Low

EPSS

0.003

Percentile

70.9%