Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-0017

Опубликовано: 14 мар. 2014
Источник: nvd
CVSS2: 1.9
EPSS Низкий

Описание

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
Версия до 0.6.2 (включая)
cpe:2.3:a:libssh:libssh:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:0.6.1:*:*:*:*:*:*:*

EPSS

Процентиль: 25%
0.00088
Низкий

1.9 Low

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
почти 12 лет назад

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

redhat
почти 12 лет назад

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

debian
почти 12 лет назад

The RAND_bytes function in libssh before 0.6.3, when forking is enable ...

github
больше 3 лет назад

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

fstec
больше 11 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 25%
0.00088
Низкий

1.9 Low

CVSS2

Дефекты

CWE-310