Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130215161436.GD3015@redhat.com>
Date: Fri, 15 Feb 2013 09:14:36 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: python-pyrad insecurities

Could a CVE be assigned to the following two issues please?

#1: https://bugzilla.redhat.com/show_bug.cgi?id=911682

Nathaniel McCallum of Red Hat reported that pyrad was using Python's
random module in a number of places to generate pseudo-random data.  In
the case of the authenticator data, it was being used to secure a
password sent over the wire.  Because Python's random module is not
really suited for this purpose (not random enough), it could lead to
password hashing that may be predictable.

#2: https://bugzilla.redhat.com/show_bug.cgi?id=911685

Nathaniel McCallum of Red Hat reported that pyrad was creating
serialized RADIUS packet IDs in the CreateID() function in packet.py.
This is not suitable for RADIUS as the RFC specifies that the ID must
not be predictable.  As a result, the ID of the next packet sent can be
spoofed.


These have been corrected in upstream's forthcoming version 2.1 via:

https://github.com/wichert/pyrad/commit/38f74b36814ca5b1a27d9898141126af4953bee5

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.