5.9
CVSSv3

CVE-2013-0294

Published: 28/01/2020 Updated: 31/01/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

packet.py in pyrad prior to 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote malicious users to obtain sensitive information via a brute force attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pyrad project pyrad

fedoraproject fedora 18

fedoraproject fedora 19

fedoraproject fedora 20

Vendor Advisories

Debian Bug report logs - #700669 pyrad: CVE-2013-0294: potentially predictable password hashing and packet IDs Package: pyrad; Maintainer for pyrad is Jeremy Lainé <jeremylaine@m4xorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 15 Feb 2013 22:33:01 UTC Severity: grave Tags: patch, security ...