Vulnerability Description
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeradius | Freeradius | All versions |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html
- http://rhn.redhat.com/errata/RHBA-2012-0881.html
- http://rhn.redhat.com/errata/RHSA-2013-0134.htmlPatchVendor Advisory
- https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html
- http://rhn.redhat.com/errata/RHBA-2012-0881.html
- http://rhn.redhat.com/errata/RHSA-2013-0134.htmlPatchVendor Advisory
- https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18
FAQ
What is CVE-2011-4966?
CVE-2011-4966 is a vulnerability with a CVSS score of 6.0 (MEDIUM). modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authentic...
How severe is CVE-2011-4966?
CVE-2011-4966 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4966?
Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius.