Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-0299

Опубликовано: 13 янв. 2008
Источник: redhat
EPSS Низкий

Описание

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=428727Paramiko insecure use of RandomPool

EPSS

Процентиль: 78%
0.01232
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

nvd
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.

debian
больше 17 лет назад

common.py in Paramiko 1.7.1 and earlier, when using threads or forked ...

CVSS3: 6.5
github
больше 3 лет назад

Paramiko Unsafe randomness usage may allow access to sensitive information

EPSS

Процентиль: 78%
0.01232
Низкий