Описание
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-4409
- http://jvn.jp/en/jp/JVN49602378/index.html
- http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html
- http://secunia.com/advisories/37628
- http://www.osvdb.org/61118
- http://www.securityfocus.com/bid/37293
- http://www.seil.jp/seilseries/security/2009/a00697.php
Связанные уязвимости
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.