CVE-2013-0342

NameCVE-2013-0342
DescriptionThe CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs701151

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pyrad (PTS)jessie2.0-2vulnerable
stretch2.0-3vulnerable
buster2.1-1vulnerable
bullseye2.1-2vulnerable
bookworm2.1-3vulnerable
sid, trixie2.4-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pyradsource(unstable)(unfixed)low701151

Notes

[bookworm] - pyrad <ignored> (Minor issue)
[bullseye] - pyrad <ignored> (Minor issue)
[buster] - pyrad <ignored> (Minor issue)
[stretch] - pyrad <ignored> (Minor issue)
[jessie] - pyrad <no-dsa> (Minor issue)
[wheezy] - pyrad <no-dsa> (Minor issue)
[squeeze] - pyrad <no-dsa> (Minor issue)
this is initially related to #700669
The issue is not fixed in 2.1 upstream, see details in
https://bugzilla.redhat.com/show_bug.cgi?id=911685#c5

Search for package or bug name: Reporting problems