Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-867g-gm3j-m6qw

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 does not configure the RANDFILE and HOME environment variables for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 does not configure the RANDFILE and HOME environment variables for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

EPSS

Процентиль: 51%
0.00275
Низкий

Связанные уязвимости

ubuntu
почти 15 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 does not configure the RANDFILE and HOME environment variables for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

nvd
почти 15 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 does not configure the RANDFILE and HOME environment variables for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

debian
почти 15 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 d ...

EPSS

Процентиль: 51%
0.00275
Низкий