Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0299

Опубликовано: 16 янв. 2008
Источник: debian

Описание

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
paramikofixed1.6.4-1.1package
paramikono-dsaetchpackage

Примечания

  • http://web.archive.org/web/20100715101310/http://www.lag.net/pipermail/paramiko/2008-January/000599.html

Связанные уязвимости

ubuntu
около 18 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

redhat
около 18 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

nvd
около 18 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

CVSS3: 6.5
github
почти 4 года назад

Paramiko Unsafe randomness usage may allow access to sensitive information