Логотип exploitDog
bind:"BDU:2020-03319" OR bind:"CVE-2019-13456"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2020-03319" OR bind:"CVE-2019-13456"

Количество 13

Количество 13

fstec логотип

BDU:2020-03319

около 6 лет назад

Уязвимость реализации EAP-pwd RADIUS-сервера FreeRADIUS, позволяющая нарушителю получить пароль для авторизации в сети Wi-Fi

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-13456

больше 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd h ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qwvf-9vg7-643x

больше 3 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1672

больше 5 лет назад

ELSA-2020-1672: freeradius:3.0 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0553-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2391-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1023-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1020-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1018-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
oracle-oval логотип

ELSA-2020-3984

около 5 лет назад

ELSA-2020-3984: freeradius security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2020-03319

Уязвимость реализации EAP-pwd RADIUS-сервера FreeRADIUS, позволяющая нарушителю получить пароль для авторизации в сети Wi-Fi

CVSS3: 6.5
0%
Низкий
около 6 лет назад
ubuntu логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 5.3
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
debian логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd h ...

CVSS3: 6.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-qwvf-9vg7-643x

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2020-1672

ELSA-2020-1672: freeradius:3.0 security update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0553-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2391-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1023-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1020-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1018-1

Security update for freeradius-server

больше 5 лет назад
oracle-oval логотип
ELSA-2020-3984

ELSA-2020-3984: freeradius security and bug fix update (MODERATE)

около 5 лет назад

Уязвимостей на страницу