Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-48195

Опубликовано: 31 дек. 2022
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

A flaw was found in mellium.im/sasl. Affected versions of this package are vulnerable to Missing Critical Steps in Authentication if the remote side of a SCRAM-based connection advertises support for channel binding since an empty nonce is used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/lighthouse-agent-rhel9Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/lighthouse-coredns-rhel8Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-coredns-rhel9Not affected
Red Hat Quay 3quay/quay-operator-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-330
Дефект:
CWE-331
https://bugzilla.redhat.com/show_bug.cgi?id=2157831mellium.im/sasl: insufficient randomness during authentication

EPSS

Процентиль: 63%
0.00437
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 3 лет назад

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

CVSS3: 9.8
github
около 3 лет назад

mellium.im/sasl authentication failure due to insufficient nonce randomness

EPSS

Процентиль: 63%
0.00437
Низкий

9.8 Critical

CVSS3

Уязвимость CVE-2022-48195