Описание
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Ссылки
- Mailing ListMitigationVendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- Mailing ListMitigationVendor Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Уязвимость реализации стандарта децентрализованной системы аутентификации OpenID, связанная с ошибками в коде генератора псевдослучайных чисел, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2