vulnerability
FreeBSD: VID-17702e54-3da0-11ec-b7e0-3085a9a95629 (CVE-2013-0342): pyrad -- multiple vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Nov 5, 2021 | Dec 10, 2025 | Dec 10, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Nov 5, 2021
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Nathaniel McCallum reports: packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack. The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.
Solutions
freebsd-upgrade-package-py36-pyradfreebsd-upgrade-package-py37-pyradfreebsd-upgrade-package-py38-pyradfreebsd-upgrade-package-py39-pyradfreebsd-upgrade-package-py310-pyrad
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.