Описание
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1 (исключая)
cpe:2.3:a:pyrad_project:pyrad:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
EPSS
Процентиль: 83%
0.01875
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-330
Связанные уязвимости
CVSS3: 5.9
ubuntu
около 6 лет назад
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
CVSS3: 5.9
debian
около 6 лет назад
packet.py in pyrad before 2.1 uses weak random numbers to generate RAD ...
CVSS3: 5.9
github
почти 4 года назад
pyrad is vulnerable to the use of Insufficiently Random Values
EPSS
Процентиль: 83%
0.01875
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-330