CVE-2013-0294

packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyrad_project:pyrad:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-28 16:15

Updated : 2024-02-04 20:39


NVD link : CVE-2013-0294

Mitre link : CVE-2013-0294

CVE.ORG link : CVE-2013-0294


JSON object : View

Products Affected

pyrad_project

  • pyrad

fedoraproject

  • fedora
CWE
CWE-330

Use of Insufficiently Random Values