Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0299

Опубликовано: 16 янв. 2008
Источник: debian
EPSS Низкий

Описание

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
paramikofixed1.6.4-1.1package
paramikono-dsaetchpackage

Примечания

  • http://web.archive.org/web/20100715101310/http://www.lag.net/pipermail/paramiko/2008-January/000599.html

EPSS

Процентиль: 78%
0.01232
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

redhat
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

nvd
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

CVSS3: 6.5
github
больше 3 лет назад

Paramiko Unsafe randomness usage may allow access to sensitive information

EPSS

Процентиль: 78%
0.01232
Низкий