CVE-2020-13881
Published at:
-
06-06-2020 09:15
Last modified:
-
05-04-2022 05:04
Total changes:
-
3
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
Verification logic
Reference
- https://github.com/kravietz/pam_tacplus/issues/149
- https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
- [oss-security] 20200608 CVE-2020-13881: pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if configured with debug parameter-Mailing List, Patch, Third Party Advisory
- [debian-lts-announce] 20200608 [SECURITY] [DLA 2239-1] libpam-tacplus security update-Mailing List, Third Party Advisory
- https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50
- USN-4521-1-Third Party Advisory
- [debian-lts-announce] 20210804 [SECURITY] [DLA 2730-1] libpam-tacplus security update-Mailing List, Third Party Advisory
Keywords