FreeBSD : duo -- Two-factor authentication bypass (738e8ae1-46dd-11e7-a539-0050569f7e80)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The duo security team reports :

An untrusted user may be able to set the http_proxy variable to an
invalid address. If this happens, this will trigger the configured
'failmode' behavior, which defaults to safe. Safe mode causes the
authentication to report a success.

See also :

https://duo.com/labs/psa/duo-psa-2017-002
http://www.nessus.org/u?1c417288

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 100582 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now