CVE-2013-0294

EUVD-2020-0156
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
pyrad_projectpyrad
𝑥
< 2.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pyrad
bookworm
2.1-3
fixed
bullseye
2.1-2
fixed
sid
2.4-1
fixed
trixie
2.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pyrad
hardy
ignored
lucid
ignored
oneiric
ignored
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
not-affected
zesty
not-affected