[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-4442Date: (C)2015-01-02   (M)2023-12-22


Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
FEDORA-2014-16368
FEDORA-2014-16406
FEDORA-2014-16473
MDVSA-2015:008
http://www.openwall.com/lists/oss-security/2013/06/06/1
http://www.openwall.com/lists/oss-security/2013/10/16/15
http://advisories.mageia.org/MGASA-2014-0535.html
http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241

CWE    1
CWE-310
OVAL    3
oval:org.secpod.oval:def:108080
oval:org.secpod.oval:def:108201
oval:org.secpod.oval:def:108069

© SecPod Technologies