7.4 High
AI Score
Confidence
Low
0.025 Low
EPSS
Percentile
90.3%
(1) iodined.c and (2) user.c in iodine before 0.7.0 allows remote attackers to bypass authentication by continuing execution after an error has been triggering.
secunia.com/advisories/59417
www.debian.org/security/2014/dsa-2964
www.openwall.com/lists/oss-security/2014/06/16/5
www.openwall.com/lists/oss-security/2014/06/18/1
bugs.debian.org/cgi-bin/bugreport.cgi?bug=751834
github.com/yarrick/iodine/blob/b715be5cf3978fbe589b03b09c9398d0d791f850/CHANGELOG