Логотип exploitDog
bind:"CVE-2019-13456" OR bind:"CVE-2019-10143" OR bind:"CVE-2019-17185"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-13456" OR bind:"CVE-2019-10143" OR bind:"CVE-2019-17185"

Количество 26

Количество 26

oracle-oval логотип

ELSA-2020-3984

около 5 лет назад

ELSA-2020-3984: freeradius security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0553-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2391-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1023-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1020-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1018-1

больше 5 лет назад

Security update for freeradius-server

EPSS: Низкий
ubuntu логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-13456

больше 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-13456

около 6 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd h ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qwvf-9vg7-643x

больше 3 лет назад

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1672

больше 5 лет назад

ELSA-2020-1672: freeradius:3.0 security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2020-03319

около 6 лет назад

Уязвимость реализации EAP-pwd RADIUS-сервера FreeRADIUS, позволяющая нарушителю получить пароль для авторизации в сети Wi-Fi

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-10143

больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2019-10143

больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2019-10143

больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2019-10143

больше 6 лет назад

It was discovered freeradius up to and including version 3.0.19 does n ...

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2019-17185

больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-17185

около 6 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-17185

больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-3984

ELSA-2020-3984: freeradius security and bug fix update (MODERATE)

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0553-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2391-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1023-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1020-1

Security update for freeradius-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1018-1

Security update for freeradius-server

больше 5 лет назад
ubuntu логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 5.3
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
debian логотип
CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd h ...

CVSS3: 6.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-qwvf-9vg7-643x

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2020-1672

ELSA-2020-1672: freeradius:3.0 security update (MODERATE)

больше 5 лет назад
fstec логотип
BDU:2020-03319

Уязвимость реализации EAP-pwd RADIUS-сервера FreeRADIUS, позволяющая нарушителю получить пароль для авторизации в сети Wi-Fi

CVSS3: 6.5
0%
Низкий
около 6 лет назад
ubuntu логотип
CVE-2019-10143

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-10143

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 6.4
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-10143

It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."

CVSS3: 7
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-10143

It was discovered freeradius up to and including version 3.0.19 does n ...

CVSS3: 7
0%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-17185

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-17185

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
0%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-17185

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу