Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0342

Опубликовано: 09 дек. 2019
Источник: debian
EPSS Низкий

Описание

The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pyradunfixedpackage

Примечания

  • this is initially related to #700669

  • The issue is not fixed in 2.1 upstream, see details in

  • https://bugzilla.redhat.com/show_bug.cgi?id=911685#c5

  • Negligible security impact, not exploitable by itself

EPSS

Процентиль: 79%
0.0129
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 6 лет назад

The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.

CVSS3: 4.3
nvd
около 6 лет назад

The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.

CVSS3: 4.3
github
почти 4 года назад

pyrad uses sequential packet IDs

EPSS

Процентиль: 79%
0.0129
Низкий