Description
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
Published: 2020-06-06
Score: 7.5 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2239-1 libpam-tacplus security update
Debian DLA Debian DLA DLA-2730-1 libpam-tacplus security update
EUVD EUVD EUVD-2020-6089 In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
Ubuntu USN Ubuntu USN USN-4521-1 pam_tacplus vulnerability
History

No history.

Subscriptions

Arista Cloudvision Portal
Canonical Ubuntu Linux
Debian Debian Linux
Pam Tacplus Project Pam Tacplus
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:32:14.180Z

Reserved: 2020-06-06T00:00:00.000Z

Link: CVE-2020-13881

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-06T19:15:09.610

Modified: 2024-11-21T05:02:04.000

Link: CVE-2020-13881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses