Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rgfv-29jm-8wcc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5, and 2.3.x before 2.3.0-beta1, does not properly configure the RANDFILE environment variable for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5, and 2.3.x before 2.3.0-beta1, does not properly configure the RANDFILE environment variable for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

EPSS

Процентиль: 54%
0.00311
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 14 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5, and 2.3.x before 2.3.0-beta1, does not properly configure the RANDFILE environment variable for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

nvd
больше 14 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5, and 2.3.x before 2.3.0-beta1, does not properly configure the RANDFILE environment variable for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file.

debian
больше 14 лет назад

The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5, ...

EPSS

Процентиль: 54%
0.00311
Низкий

Дефекты

CWE-20