CVE-2020-13881
Summary
| CVE | CVE-2020-13881 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-06 19:15:00 UTC |
| Updated | 2022-04-05 15:04:00 UTC |
| Description | In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| oss-security - CVE-2020-13881: pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared
secret gets logged via syslog if configured with debug parameter |
MLIST |
www.openwall.com |
Mailing List, Patch, Third Party Advisory |
| [SECURITY] [DLA 2239-1] libpam-tacplus security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-4521-1: pam_tacplus vulnerability | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| [SECURITY] [DLA 2730-1] libpam-tacplus security update |
MLIST |
lists.debian.org |
|
| Printing server secret key in plain text in journalctl · Issue #149 · kravietz/pam_tacplus · GitHub |
MISC |
github.com |
Third Party Advisory |
| pam: don't leak TACACS+ secret to journald · kravietz/pam_tacplus@4a9852c · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Security Advisory 0050 - Arista |
MISC |
www.arista.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178740 Debian Security Update for libpam-tacplus (DLA 2730-1)