Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cq23-cxpr-f49x

Опубликовано: 21 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.

It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.

EPSS

Процентиль: 90%
0.05925
Низкий

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 5.9
nvd
больше 4 лет назад

It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.

CVSS3: 5.9
fstec
больше 4 лет назад

Уязвимость реализации стандарта децентрализованной системы аутентификации OpenID, связанная с ошибками в коде генератора псевдослучайных чисел, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 90%
0.05925
Низкий

Дефекты

CWE-338