cvelist/2006/1xxx/CVE-2006-1378.json
2019-03-18 03:39:46 +00:00

82 lines
2.8 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PasswordSafe 3.0 beta, when running on Windows before XP, uses a weak random number generator (C++ rand function) during generation of the database encryption key, which makes it easier for attackers to decrypt the database and steal passwords by generating keys for all possible rand() seed values and conducting a known plaintext attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "passwordsafe-key-brute-force(25429)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25429"
},
{
"name": "618",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/618"
},
{
"name": "20060323 PasswordSafe 3.0 weak random number generator allows key recovery attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428552/100/0/threaded"
},
{
"name": "20060907 Re: PasswordSafe 3.0 weak random number generator allows key recovery attack",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/445509/100/0/threaded"
},
{
"name": "17200",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17200"
}
]
}
}