vulnerability

FreeBSD: VID-17702e54-3da0-11ec-b7e0-3085a9a95629 (CVE-2013-0342): pyrad -- multiple vulnerabilities

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Nov 5, 2021
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

Nathaniel McCallum reports: packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack. The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.

Solutions

freebsd-upgrade-package-py36-pyradfreebsd-upgrade-package-py37-pyradfreebsd-upgrade-package-py38-pyradfreebsd-upgrade-package-py39-pyradfreebsd-upgrade-package-py310-pyrad
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.