Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2705

Опубликовано: 05 авг. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

released

1.8.7.249-2ubuntu0.1
maverick

released

1.8.7.299-2ubuntu0.1
natty

released

1.8.7.302-2ubuntu0.1
oneiric

not-affected

1.8.7.352-2
precise

not-affected

quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

ignored

end of life
maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

not-affected

1.9.2.290-2
precise

not-affected

quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

EPSS

Процентиль: 79%
0.0137
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

nvd
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

debian
около 14 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby ...

github
больше 3 лет назад

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

oracle-oval
больше 13 лет назад

ELSA-2011-1581: ruby security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 79%
0.0137
Низкий

5 Medium

CVSS2