Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2705

Опубликовано: 02 июл. 2011
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4rubyAffected
Red Hat Enterprise Linux 5rubyAffected
Red Hat Enterprise Linux 6rubyFixedRHSA-2011:158105.12.2011

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=722415ruby: Properly initialize the random number generator when forking new process

EPSS

Процентиль: 78%
0.01202
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

nvd
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

debian
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby ...

github
больше 3 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

oracle-oval
больше 13 лет назад

ELSA-2011-1581: ruby security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 78%
0.01202
Низкий

2.1 Low

CVSS2