Описание
Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise MRG 1 | cumin | Will not fix | ||
| MRG for RHEL-5 v. 2 | condor | Fixed | RHSA-2012:1278 | 19.09.2012 |
| MRG for RHEL-5 v. 2 | condor-wallaby | Fixed | RHSA-2012:1278 | 19.09.2012 |
| MRG for RHEL-5 v. 2 | condor-wallaby-base-db | Fixed | RHSA-2012:1278 | 19.09.2012 |
| MRG for RHEL-5 v. 2 | cumin | Fixed | RHSA-2012:1278 | 19.09.2012 |
| MRG for RHEL-5 v. 2 | sesame | Fixed | RHSA-2012:1278 | 19.09.2012 |
| MRG for RHEL-5 v. 2 | wallaby | Fixed | RHSA-2012:1278 | 19.09.2012 |
| Red Hat Enterprise MRG 2 | condor | Fixed | RHSA-2012:1281 | 19.09.2012 |
| Red Hat Enterprise MRG 2 | condor-wallaby | Fixed | RHSA-2012:1281 | 19.09.2012 |
| Red Hat Enterprise MRG 2 | condor-wallaby-base-db | Fixed | RHSA-2012:1281 | 19.09.2012 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=827558cumin: weak session keys
EPSS
Процентиль: 70%
0.00651
Низкий
5.8 Medium
CVSS2
Связанные уязвимости
nvd
больше 13 лет назад
Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.
github
больше 3 лет назад
Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.
EPSS
Процентиль: 70%
0.00651
Низкий
5.8 Medium
CVSS2