aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln-2021.xml
diff options
context:
space:
mode:
authorKai Knoblich <kai@FreeBSD.org>2021-11-05 08:13:03 +0000
committerKai Knoblich <kai@FreeBSD.org>2021-11-05 08:35:56 +0000
commit5966fe85979f7dfba254e49a747714c2c8f223af (patch)
treeab3f2c374117c33a14f8e5989e6f049dfd5c01c7 /security/vuxml/vuln-2021.xml
parent5ed693e21d47b0344be156e48bb869d66ac59385 (diff)
downloadports-5966fe85979f7dfba254e49a747714c2c8f223af.tar.gz
ports-5966fe85979f7dfba254e49a747714c2c8f223af.zip
security/vuxml: Document net/pyrad security issues
PR: 259332
Diffstat (limited to 'security/vuxml/vuln-2021.xml')
-rw-r--r--security/vuxml/vuln-2021.xml35
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 856fc5089d78..904ab98e7dc9 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,38 @@
+ <vuln vid="17702e54-3da0-11ec-b7e0-3085a9a95629">
+ <topic>pyrad -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py36-pyrad</name>
+ <name>py37-pyrad</name>
+ <name>py38-pyrad</name>
+ <name>py39-pyrad</name>
+ <name>py310-pyrad</name>
+ <range><lt>2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Nathaniel McCallum reports:</p>
+ <blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=911682">
+ <p>packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.</p>
+ </blockquote>
+ <blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=911685">
+ <p>The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-0294</cvename>
+ <cvename>CVE-2013-0342</cvename>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=911682</url>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=911685</url>
+ </references>
+ <dates>
+ <discovery>2013-01-15</discovery>
+ <entry>2021-11-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="930def19-3e05-11ec-9ba8-002324b2fba8">
<topic>go -- multiple vulnerabilities</topic>
<affects>