First published: Mon Feb 24 2020(Updated: )
It was discovered that libpam-radius-auth incorrectly handled certain long passwords. A remote attacker could possibly use this issue to cause libpam-radius-auth to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-radius-auth | <1.3.17-0ubuntu5.19.10.1 | 1.3.17-0ubuntu5.19.10.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/libpam-radius-auth | <1.3.17-0ubuntu5.18.04.1 | 1.3.17-0ubuntu5.18.04.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libpam-radius-auth | <1.3.17-0ubuntu4.1 | 1.3.17-0ubuntu4.1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4290-1 is critical due to the potential for denial of service.
To fix USN-4290-1, upgrade libpam-radius-auth to version 1.3.17-0ubuntu5.19.10.1 or later depending on your Ubuntu version.
USN-4290-1 affects libpam-radius-auth versions prior to 1.3.17-0ubuntu5.19.10.1 for Ubuntu 19.10, 1.3.17-0ubuntu5.18.04.1 for Ubuntu 18.04, and 1.3.17-0ubuntu4.1 for Ubuntu 16.04.
A remote attacker can exploit the vulnerability in USN-4290-1 by sending specially crafted long passwords.
The impact of the USN-4290-1 vulnerability is that it could cause libpam-radius-auth to crash, leading to a denial of service.