2024-12-08 03:06:42 +00:00

153 lines
4.8 KiB
JSON

{
"id": "CVE-2007-4311",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-08-13T21:17:00.000",
"lastModified": "2024-11-21T00:35:17.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator."
},
{
"lang": "es",
"value": "La funci\u00f3n xfer_secondary_pool en el archivo drivers/char/random.c en el kernel de Linux versiones 2.4 anteriores a 2.4.35, realiza operaciones de reconfiguraci\u00f3n solo en los primeros bytes de un b\u00fafer, lo que podr\u00eda hacer mas f\u00e1cil para los atacantes predecir la salida del generador de n\u00fameros aleatorios, relacionado con el uso incorrecto del operador sizeof."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.34",
"matchCriteriaId": "5C3B1DA1-47AF-4C15-877D-D971D95623BE"
}
]
}
]
}
],
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=bd67d4c7b11cc33ebdc346bc8926d255b354cd64",
"source": "cve@mitre.org"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=faa3369ac2ea7feb0dd266b6a5e8d6ab153cf925",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/29058",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1503",
"source": "cve@mitre.org"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6",
"source": "cve@mitre.org"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25029",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/2690",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=bd67d4c7b11cc33ebdc346bc8926d255b354cd64",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=faa3369ac2ea7feb0dd266b6a5e8d6ab153cf925",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/29058",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1503",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25029",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/2690",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}