First published: Tue Mar 03 2020(Updated: )
USN-4290-1 fixed a vulnerability in libpam-radius-auth. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that libpam-radius-auth incorrectly handled certain long passwords. A remote attacker could possibly use this issue to cause libpam-radius-auth to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-radius-auth | <1.3.17-0ubuntu4+esm1 | 1.3.17-0ubuntu4+esm1 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libpam-radius-auth | <1.3.17-0ubuntu3.1 | 1.3.17-0ubuntu3.1 |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in USN-4290-2 has a medium severity rating due to its potential impact on authentication mechanisms.
To fix the vulnerability outlined in USN-4290-2, upgrade libpam-radius-auth to version 1.3.17-0ubuntu4+esm1 for Ubuntu 14.04 ESM or 1.3.17-0ubuntu3.1 for Ubuntu 12.04 ESM.
USN-4290-2 affects Ubuntu 12.04 ESM and Ubuntu 14.04 ESM with specific versions of the libpam-radius-auth package.
USN-4290-2 addresses vulnerabilities that could allow remote attackers to exploit authentication processes using long passwords.
Yes, USN-4290-2 specifically addresses a vulnerability in the libpam-radius-auth package.