|
Message-ID: <20130215161436.GD3015@redhat.com> Date: Fri, 15 Feb 2013 09:14:36 -0700 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: python-pyrad insecurities Could a CVE be assigned to the following two issues please? #1: https://bugzilla.redhat.com/show_bug.cgi?id=911682 Nathaniel McCallum of Red Hat reported that pyrad was using Python's random module in a number of places to generate pseudo-random data. In the case of the authenticator data, it was being used to secure a password sent over the wire. Because Python's random module is not really suited for this purpose (not random enough), it could lead to password hashing that may be predictable. #2: https://bugzilla.redhat.com/show_bug.cgi?id=911685 Nathaniel McCallum of Red Hat reported that pyrad was creating serialized RADIUS packet IDs in the CreateID() function in packet.py. This is not suitable for RADIUS as the RFC specifies that the ID must not be predictable. As a result, the ID of the next packet sent can be spoofed. These have been corrected in upstream's forthcoming version 2.1 via: https://github.com/wichert/pyrad/commit/38f74b36814ca5b1a27d9898141126af4953bee5 -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.