CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-12-03 20:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-13456

Mitre link : CVE-2019-13456

CVE.ORG link : CVE-2019-13456


JSON object : View

Products Affected

linux

  • linux_kernel

freeradius

  • freeradius

opensuse

  • leap

redhat

  • enterprise_linux
CWE
CWE-203

Observable Discrepancy