(1) iodined.c and (2) user.c in iodine before 0.7.0 allows remote attackers to bypass authentication by continuing execution after an error has been triggering.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-07-03T17:00:00
Updated: 2014-07-03T16:57:00
Reserved: 2014-06-17T00:00:00
Link: CVE-2014-4168
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-07-03T17:55:06.140
Modified: 2014-07-07T14:49:48.077
Link: CVE-2014-4168
JSON object: View
Redhat Information
No data.
CWE