3 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure. En el archivo pam_tacplus.c en pam_tacplus versiones anteriores a 1.4.1, la función pam_sm_acct_mgmt no pone a cero la estructura de datos arep • https://github.com/kravietz/pam_tacplus/commit/e4c00eba70a0f72c4de77b5f072c69708ec2beab •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id. libtac en pam_tacplus versiones hasta 1.5.1, carece de una comprobación para un fallo de las funciones RAND_bytes()/RAND_pseudo_bytes(). Esto podría conllevar al uso de un session_id no aleatorio y predecible • https://github.com/kravietz/pam_tacplus/pull/163 https://tools.ietf.org/html/rfc8907 • CWE-330: Use of Insufficiently Random Values •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. En el archivo support.c en pam_tacplus versiones 1.3.8 hasta 1.5.1, el secreto compartido TACACS+ es registrado por medio de syslog si el nivel de registro DEBUG y journald son usados • http://www.openwall.com/lists/oss-security/2020/06/08/1 https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 https://github.com/kravietz/pam_tacplus/issues/149 https://lists.debian.org/debian-lts-announce/2020/06/msg00007.html https://lists.debian.org/debian-lts-announce/2021/08/msg00006.html https://usn.ubuntu.com/4521-1 https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50 • CWE-532: Insertion of Sensitive Information into Log File •