(1) iodined.c and (2) user.c in iodine before 0.7.0 allows remote attackers to bypass authentication by continuing execution after an error has been triggering.
https://github.com/yarrick/iodine/blob/b715be5cf3978fbe589b03b09c9398d0d791f850/CHANGELOG
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751834
http://www.openwall.com/lists/oss-security/2014/06/18/1
http://www.openwall.com/lists/oss-security/2014/06/16/5