[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-2686Date: (C)2011-08-05   (M)2023-12-22


Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-49015
FEDORA-2011-9359
FEDORA-2011-9374
http://www.openwall.com/lists/oss-security/2011/07/11/1
http://www.openwall.com/lists/oss-security/2011/07/12/14
http://www.openwall.com/lists/oss-security/2011/07/20/1
http://redmine.ruby-lang.org/issues/show/4338
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=31713
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
https://bugzilla.redhat.com/show_bug.cgi?id=722415
ruby-random-number-dos(69032)

CPE    4
cpe:/a:ruby-lang:ruby
cpe:/a:ruby-lang:ruby:1.8.7:p72
cpe:/a:ruby-lang:ruby:1.8.7:p71
cpe:/a:ruby-lang:ruby:1.8.7:p22
...
CWE    1
CWE-310
OVAL    7
oval:org.secpod.oval:def:202291
oval:org.secpod.oval:def:102848
oval:org.secpod.oval:def:202289
oval:org.secpod.oval:def:102763
...

© SecPod Technologies