Описание
The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-2190
- https://bugzilla.redhat.com/show_bug.cgi?id=713304
- http://code.google.com/p/cherokee/issues/detail?id=1212
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html
- http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz
- http://www.openwall.com/lists/oss-security/2011/06/03/4
- http://www.openwall.com/lists/oss-security/2011/06/06/21
- http://www.securityfocus.com/bid/49772
EPSS
CVE ID
Связанные уязвимости
The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
The generate_admin_password function in Cherokee before 1.2.99 uses ti ...
EPSS