cvelist/2018/9xxx/CVE-2018-9057.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2018-03-27 14:05:58 -04:00
{
2019-03-17 23:07:58 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-9057",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-03-27 14:05:58 -04:00
{
2019-03-17 23:07:58 +00:00
"lang": "eng",
"value": "aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password."
2018-03-27 14:05:58 -04:00
}
2019-03-17 23:07:58 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/terraform-providers/terraform-provider-aws/pull/3934",
"refsource": "MISC",
"url": "https://github.com/terraform-providers/terraform-provider-aws/pull/3934"
}
]
}
}