Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-2705

Опубликовано: 05 авг. 2011
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия до 1.8.7-334 (включая)
cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-160:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-173:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-248:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-249:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-299:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-302:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7-p21:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.2-p136:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.2-p180:*:*:*:*:*:*:*

EPSS

Процентиль: 79%
0.0137
Низкий

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

redhat
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

debian
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby ...

github
больше 3 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

oracle-oval
больше 13 лет назад

ELSA-2011-1581: ruby security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 79%
0.0137
Низкий

5 Medium

CVSS2

Дефекты

CWE-20