ID CVE-2013-4442
Summary Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.
References
Vulnerable Configurations
  • cpe:2.3:a:pwgen_project:pwgen:2.06:*:*:*:*:*:*:*
    cpe:2.3:a:pwgen_project:pwgen:2.06:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 10-09-2015 - 15:27)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
confirm
fedora
  • FEDORA-2014-16368
  • FEDORA-2014-16406
  • FEDORA-2014-16473
mandriva MDVSA-2015:008
misc https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241
mlist
  • [oss-security] 20140606 Re: CVE Request: pwgen
  • [oss-security] 20141015 Re: RESEND: CVE Request: pwgen
Last major update 10-09-2015 - 15:27
Published 19-12-2014 - 15:59
Last modified 10-09-2015 - 15:27
Back to Top