Описание
pyrad is vulnerable to the use of Insufficiently Random Values
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-0294
- https://github.com/wichert/pyrad/commit/38f74b36814ca5b1a27d9898141126af4953bee5
- https://bugzilla.redhat.com/show_bug.cgi?id=911682
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82133
- https://github.com/pypa/advisory-database/tree/main/vulns/pyrad/PYSEC-2020-211.yaml
- https://web.archive.org/web/20200228160027/http://www.securityfocus.com/bid/57984
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115677.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115705.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116567.html
- http://www.openwall.com/lists/oss-security/2013/02/15/13
Пакеты
pyrad
< 2.1
2.1
Связанные уязвимости
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
packet.py in pyrad before 2.1 uses weak random numbers to generate RAD ...