CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

01 Jan 2022, 20:06

Type Values Removed Values Added
CPE cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CWE CWE-200 CWE-203
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html - Mailing List, Third Party Advisory
References (CONFIRM) https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa - (CONFIRM) https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa - Patch, Third Party Advisory

Information

Published : 2019-12-03 20:15

Updated : 2024-02-04 20:39


NVD link : CVE-2019-13456

Mitre link : CVE-2019-13456

CVE.ORG link : CVE-2019-13456


JSON object : View

Products Affected

opensuse

  • leap

freeradius

  • freeradius

redhat

  • enterprise_linux

linux

  • linux_kernel
CWE
CWE-203

Observable Discrepancy