Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0486

Опубликовано: 09 фев. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

3.2.4.0-3
gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

not-affected

3.2.4.0-3
lucid

not-affected

3.2.4.0-3
maverick

not-affected

3.2.4.0-3
natty

not-affected

3.2.4.0-3

Показывать по

Ссылки на источники

EPSS

Процентиль: 35%
0.0014
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.

nvd
почти 17 лет назад

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.

debian
почти 17 лет назад

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls t ...

github
больше 3 лет назад

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.

EPSS

Процентиль: 35%
0.0014
Низкий

7.5 High

CVSS2