Vulnerability CVE-2001-1467


Published: 2001-04-11   Modified: 2012-02-12

Description:
mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Don libes -> Expect 

 References:
http://archives.neohapsis.com/archives/bugtraq/2001-04/0173.html
http://archives.neohapsis.com/archives/bugtraq/2001-04/0192.html
http://securitytracker.com/id?1001303
http://www.kb.cert.org/vuls/id/527736
http://www.securityfocus.com/bid/2632
https://exchange.xforce.ibmcloud.com/vulnerabilities/6382

Copyright 2024, cxsecurity.com

 

Back to Top