Vulnerability Details : CVE-2011-4966
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
Products affected by CVE-2011-4966
- cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4966
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4966
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
CWE ids for CVE-2011-4966
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4966
-
http://rhn.redhat.com/errata/RHBA-2012-0881.html
RHBA-2012:0881 - Bug Fix Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2013-01/msg00079.html
openSUSE-SU-2013:0191-1: moderate: freeradius-server
-
http://rhn.redhat.com/errata/RHSA-2013-0134.html
RHSA-2013:0134 - Security Advisory - Red Hat Customer PortalPatch;Vendor Advisory
-
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605
heck for account and password expiration · alandekok/freeradius-server@1b1ec5c · GitHub
-
http://lists.opensuse.org/opensuse-updates/2013-01/msg00029.html
openSUSE-SU-2013:0137-1: moderate: update for freeradius-server
Jump to