CVE Vulnerabilities

CVE-2014-4168

Improper Authentication

Published: Jul 03, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

(1) iodined.c and (2) user.c in iodine before 0.7.0 allows remote attackers to bypass authentication by continuing execution after an error has been triggering.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
IodineKryo*0.6.0 (including)
IodineKryo0.3.0 (including)0.3.0 (including)
IodineKryo0.3.1 (including)0.3.1 (including)
IodineKryo0.3.2 (including)0.3.2 (including)
IodineKryo0.3.3 (including)0.3.3 (including)
IodineKryo0.3.4 (including)0.3.4 (including)
IodineKryo0.4.0 (including)0.4.0 (including)
IodineKryo0.4.1 (including)0.4.1 (including)
IodineKryo0.4.2 (including)0.4.2 (including)
IodineKryo0.5.0 (including)0.5.0 (including)
IodineKryo0.5.1 (including)0.5.1 (including)
IodineKryo0.5.2 (including)0.5.2 (including)
IodineUbuntulucid*
IodineUbuntuprecise*
IodineUbuntusaucy*
IodineUbuntutrusty*
IodineUbuntuupstream*

Potential Mitigations

References