CVE-2011-4966

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html -
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html -
References () http://rhn.redhat.com/errata/RHBA-2012-0881.html - () http://rhn.redhat.com/errata/RHBA-2012-0881.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0134.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-0134.html - Patch, Vendor Advisory
References () https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 - () https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 -

Information

Published : 2013-03-12 23:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-4966

Mitre link : CVE-2011-4966

CVE.ORG link : CVE-2011-4966


JSON object : View

Products Affected

freeradius

  • freeradius
CWE
CWE-255

Credentials Management Errors