CVE-2020-13881

Publication date 6 June 2020

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.

Status

Package Ubuntu Release Status
libpam-tacplus 24.10 oracular Not in release
24.04 LTS noble Not in release
23.10 mantic Ignored end of life, was needs-triage
23.04 lunar Ignored end of life, was needs-triage
22.10 kinetic Ignored end of life, was needs-triage
22.04 LTS jammy
Needs evaluation
21.10 impish Ignored end of life
21.04 hirsute Ignored end of life
20.10 groovy Ignored end of life
20.04 LTS focal
Fixed 1.3.8-2+deb8u1build0.20.04.1
19.10 eoan Ignored end of life
18.04 LTS bionic
Fixed 1.3.8-2+deb8u1build0.18.04.1
16.04 LTS xenial
Fixed 1.3.8-2+deb8u1build0.16.04.1
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libpam-tacplus

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-4521-1
    • pam_tacplus vulnerability
    • 21 September 2020

Other references