ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.
References
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=100749428517090&w=2 - Exploit, Mailing List | |
References | () http://www.securityfocus.com/bid/3618 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3620 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.valicert.com/support/security_advisory_eva.html - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - Third Party Advisory, VDB Entry |
15 Feb 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=100749428517090&w=2 - Exploit, Mailing List | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/3620 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/3618 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - Broken Link | |
CPE | cpe:2.3:a:valicert:enterprise_validation_authority:3.9:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:3.3:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:3.8:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:4.0:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:4.1:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:3.4:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:3.6:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:4.2:*:*:*:*:*:*:* cpe:2.3:a:valicert:enterprise_validation_authority:3.7:*:*:*:*:*:*:* |
cpe:2.3:a:valicert:enterprise_validation_authority:*:*:*:*:*:*:*:* |
CWE | CWE-331 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.5 |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - URL Repurposed |
Information
Published : 2001-12-04 05:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-0950
Mitre link : CVE-2001-0950
CVE.ORG link : CVE-2001-0950
JSON object : View
Products Affected
valicert
- enterprise_validation_authority
CWE
CWE-331
Insufficient Entropy