cvelist/2018/9xxx/CVE-2018-9426.json

85 lines
3.1 KiB
JSON
Raw Normal View History

2018-04-05 22:03:54 -04:00
{
2024-12-02 22:00:31 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-18 02:38:32 +00:00
"CVE_data_meta": {
"ID": "CVE-2018-9426",
2024-12-02 22:00:31 +00:00
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
2019-03-18 02:38:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-12-02 22:00:31 +00:00
"value": "In \u00a0RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java,\u00a0an incorrect implementation could cause weak RSA key pairs being generated.\u00a0This could lead to crypto vulnerability with no additional execution\u00a0privileges needed. User interaction is not needed for exploitation.\u00a0Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard."
2019-03-18 02:38:32 +00:00
}
]
2024-12-02 22:00:31 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "7"
},
{
"version_affected": "=",
"version_value": "7.1.1"
},
{
"version_affected": "=",
"version_value": "7.1.2"
},
{
"version_affected": "=",
"version_value": "8"
},
{
"version_affected": "=",
"version_value": "8.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01",
"refsource": "MISC",
"name": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
2019-03-18 02:38:32 +00:00
}
}