mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
163 lines
5.4 KiB
JSON
163 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2011-0766",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2011-05-31T20:55:01.780",
|
|
"lastModified": "2023-09-25T15:28:08.560",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El generador de n\u00fameros aleatorios de la aplicaci\u00f3n Crypto en versiones anteriores a la 2.0.2.2, y SSH anteriores a 2.0.5, como es usado en la librer\u00eda Erlang/OTP ssh en versiones anteriores a la R14B03, utiliza semillas predecibles basadas en la fecha actual, lo que facilita a atacantes remotos adivinar el host DSA y las claves de sesi\u00f3n SSH."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-310"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:crypto:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.2.1",
|
|
"matchCriteriaId": "A5C36D51-22EA-4973-BD37-34A148222677"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r11b-5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E83FC35B-457E-461C-939A-2A2DAB1C2461"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r12b-5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6C511C8-EE7D-4E4F-829A-8A28A3F5DE7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADBDFE1E-0212-4A40-AF37-452469A591DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b02-1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90FCA4F4-F172-44F8-A7E9-03C4374D8BE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33E2E62B-42A6-4D2C-80D0-B1AFD8F24E4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "586A5C8B-0842-4D1C-A33A-A5E4AB0F7422"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98D07E19-8830-4112-993B-92475F37CB68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13DF6614-88C8-49CE-97E3-0AD2D3972182"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10182FC9-2DE9-4FAD-8C9D-D5B21A735824"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4106F0A1-8582-46CD-9F8F-1A613B272DF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.4",
|
|
"matchCriteriaId": "B5FC28F2-797D-4C4E-B9B8-D89A3AAD7950"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/44709",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/178990",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/47980",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |