packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
References
Configurations
History
No history.
Information
Published : 2020-01-28 16:15
Updated : 2024-11-21 01:47
NVD link : CVE-2013-0294
Mitre link : CVE-2013-0294
CVE.ORG link : CVE-2013-0294
JSON object : View
Products Affected
pyrad_project
- pyrad
fedoraproject
- fedora
CWE
CWE-330
Use of Insufficiently Random Values