Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Pam_tacplus
(Pam_tacplus_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-06-06 | CVE-2020-13881 | In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. | Cloudvision_portal, Ubuntu_linux, Debian_linux, Pam_tacplus | 7.5 | ||
2020-10-26 | CVE-2020-27743 | libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id. | Pam_tacplus | 9.8 | ||
2022-04-21 | CVE-2016-20014 | In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure. | Pam_tacplus | 9.8 |