CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

01 Jan 2022, 20:06

Type Values Removed Values Added
First Time Opensuse
Opensuse leap
CWE CWE-200 CWE-203
CPE cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa - (CONFIRM) https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa - Patch, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html - Mailing List, Third Party Advisory

Information

Published : 2019-12-03 20:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-13456

Mitre link : CVE-2019-13456

CVE.ORG link : CVE-2019-13456


JSON object : View

Products Affected

opensuse

  • leap

linux

  • linux_kernel

redhat

  • enterprise_linux

freeradius

  • freeradius
CWE
CWE-203

Observable Discrepancy