cvelist/2012/3xxx/CVE-2012-3458.json

87 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 01:50:19 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3458",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 01:50:19 +00:00
"lang": "eng",
"value": "Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors."
2017-10-16 12:31:07 -04:00
}
2019-03-18 01:50:19 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5",
"refsource": "CONFIRM",
"url": "https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5"
},
{
"name": "50226",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50226"
},
{
"name": "50520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50520"
},
{
"name": "[oss-security] 20120813 ANN: Beaker 1.6.4 released with important security update",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/13/10"
},
{
"name": "DSA-2541",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2541"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=809267",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=809267"
}
]
}
}