CVE-2014-3503: Insecure Random implementations used to generate passwords in
Apache Syncope
Severity: Major
Vendor: The Apache Software Foundation
Versions Affected:
This vulnerability affects all versions of Apache Syncope 1.1.x prior to
1.1.8 'Ad libitum'. The 1.0.x releases are not affected.
Description:
A password is generated for a user in Apache Syncope under certain
circumstances, when no existing password is found. However, the password
generation code is relying on insecure Random implementations, which means that
an attacker could attempt to guess a generated password.
This has been fixed in revision:
http://svn.apache.org/viewvc?view=revision&revision=1596537
Migration:
Syncope 1.0.x users are not affected by this issue.
Syncope 1.1.x users should upgrade to 1.1.8 'Ad libitum' as soon as possible.
References: http://syncope.apache.org/security.html