Логотип exploitDog
bind:CVE-2022-48195
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-48195

Количество 3

Количество 3

redhat логотип

CVE-2022-48195

около 3 лет назад

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2022-48195

около 3 лет назад

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gvfj-fxx3-j323

около 3 лет назад

mellium.im/sasl authentication failure due to insufficient nonce randomness

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-48195

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

CVSS3: 9.8
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-48195

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-gvfj-fxx3-j323

mellium.im/sasl authentication failure due to insufficient nonce randomness

CVSS3: 9.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу