| Vulnerability Name: | CVE-2004-2163 (CCN-17456) | ||||||||
| Assigned: | 2004-09-21 | ||||||||
| Published: | 2004-09-21 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spoofing server replies. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||
| References: | Source: CCN Type: VulnWatch Mailing List, Tue Sep 21 2004 - 01:49:40 CDT OpenBSD radius authentication vulnerability Source: VULNWATCH Type: Vendor Advisory 20040921 OpenBSD radius authentication vulnerability Source: MITRE Type: CNA CVE-2004-2163 Source: CCN Type: SA12617 OpenBSD Radius Authentication "login_radius" Security Bypass Source: SECUNIA Type: Patch, Vendor Advisory 12617 Source: CCN Type: OpenBSD Web site OpenBSD Source: CONFIRM Type: Patch http://www.openbsd.org/errata35.html#radius Source: OSVDB Type: UNKNOWN 10203 Source: CCN Type: OSVDB ID: 10203 OpenBSD Radius Authentication UDP Spoofing Bypass Source: CCN Type: OSVDB ID: 15804 F5 BIG-IP / 3-DNS Radius Authentication login_radius Security Bypass Source: MISC Type: Patch, Vendor Advisory http://www.reseau.nl/advisories/0400-openbsd-radius.txt Source: BID Type: Patch 11227 Source: CCN Type: BID-11227 OpenBSD Radius Authentication Bypass Vulnerability Source: XF Type: UNKNOWN openbsd-radius-auth-bypass(17456) Source: XF Type: UNKNOWN openbsd-radius-auth-bypass(17456) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||