First published: Tue Apr 30 2024(Updated: )
It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/anope | <2.0.12-1ubuntu1 | 2.0.12-1ubuntu1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/anope | <2.0.12-1ubuntu0.23.10.1 | 2.0.12-1ubuntu0.23.10.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/anope | <2.0.9-1ubuntu0.1 | 2.0.9-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/anope | <2.0.6-1ubuntu0.1 | 2.0.6-1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/anope | <2.0.4-2ubuntu0.1~esm1 | 2.0.4-2ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/anope | <2.0.3-1ubuntu0.1~esm1 | 2.0.3-1ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6761-1 is currently classified as critical due to the potential for unauthorized access to suspended accounts.
To fix USN-6761-1, you need to update Anope to the appropriate patched version provided for your Ubuntu release.
USN-6761-1 affects multiple versions of Anope, including 2.0.3 to 2.0.12 across various Ubuntu releases.
The vulnerability in USN-6761-1 impacts suspended accounts, allowing attackers to potentially log in after changing their passwords.
Yes, due to the unauthorized access to suspended accounts, USN-6761-1 could potentially lead to data breaches.