[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-0017Date: (C)2015-12-16   (M)2023-12-22


The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 1.9
Exploit Score: 3.4
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECUNIA-57407
DSA-2879
USN-2145-1
http://www.openwall.com/lists/oss-security/2014/03/05/1
http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/
https://bugzilla.redhat.com/show_bug.cgi?id=1072191
openSUSE-SU-2014:0366
openSUSE-SU-2014:0370

CPE    12
cpe:/a:libssh:libssh:0.5.0:rc1
cpe:/a:libssh:libssh
cpe:/a:libssh:libssh:0.4.8
cpe:/a:libssh:libssh:0.4.7
...
CWE    1
CWE-310
OVAL    6
oval:org.secpod.oval:def:108236
oval:org.secpod.oval:def:108237
oval:org.secpod.oval:def:106536
oval:org.secpod.oval:def:106454
...

© SecPod Technologies