Описание
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | not-affected | 3.2.1+dfsg-1 |
| esm-infra/bionic | ignored | changes too intrusive |
| esm-infra/focal | ignored | changes too intrusive |
| esm-infra/xenial | not-affected | code not present |
| focal | ignored | end of standard support, was ignored [changes too intrusive] |
| jammy | not-affected | 3.0.26~dfsg~git20220223.1.00ed0241fa-0ubuntu3 |
| kinetic | not-affected | 3.2.0+dfsg-1 |
| trusty | ignored | end of standard support |
| upstream | needs-triage |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
In freeradius, the EAP-PWD function compute_password_element() leaks i ...
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
EPSS
7.5 High
CVSS3