Vulnerability Description
login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spoofing server replies.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openbsd | 3.2 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0058.htmlVendor Advisory
- http://secunia.com/advisories/12617PatchVendor Advisory
- http://www.openbsd.org/errata35.html#radiusPatch
- http://www.osvdb.org/10203
- http://www.reseau.nl/advisories/0400-openbsd-radius.txtPatchVendor Advisory
- http://www.securityfocus.com/bid/11227Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17456
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0058.htmlVendor Advisory
- http://secunia.com/advisories/12617PatchVendor Advisory
- http://www.openbsd.org/errata35.html#radiusPatch
- http://www.osvdb.org/10203
- http://www.reseau.nl/advisories/0400-openbsd-radius.txtPatchVendor Advisory
- http://www.securityfocus.com/bid/11227Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17456
FAQ
What is CVE-2004-2163?
CVE-2004-2163 is a vulnerability with a CVSS score of 7.5 (HIGH). login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spo...
How severe is CVE-2004-2163?
CVE-2004-2163 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2163?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openbsd.