CVE-2001-0950

ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.
References
Link Resource
http://marc.info/?l=bugtraq&m=100749428517090&w=2 Exploit Mailing List
http://www.securityfocus.com/bid/3618 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/3620 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.valicert.com/support/security_advisory_eva.html Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=100749428517090&w=2 Exploit Mailing List
http://www.securityfocus.com/bid/3618 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/3620 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.valicert.com/support/security_advisory_eva.html Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:valicert:enterprise_validation_authority:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=100749428517090&w=2 - Exploit, Mailing List () http://marc.info/?l=bugtraq&m=100749428517090&w=2 - Exploit, Mailing List
References () http://www.securityfocus.com/bid/3618 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/3618 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () http://www.securityfocus.com/bid/3620 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/3620 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () http://www.valicert.com/support/security_advisory_eva.html - Broken Link () http://www.valicert.com/support/security_advisory_eva.html - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - Third Party Advisory, VDB Entry

15 Feb 2024, 03:29

Type Values Removed Values Added
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=100749428517090&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=100749428517090&w=2 - Exploit, Mailing List
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/3620 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/3620 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/3618 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/3618 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - URL Repurposed (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - Broken Link
CPE cpe:2.3:a:valicert:enterprise_validation_authority:3.5:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.9:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.3:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.8:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.0:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.1:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.4:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.6:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:4.2:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:3.7:*:*:*:*:*:*:*
cpe:2.3:a:valicert:enterprise_validation_authority:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-331
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 7.5

14 Feb 2024, 01:17

Type Values Removed Values Added
References (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - (CONFIRM) http://www.valicert.com/support/security_advisory_eva.html - URL Repurposed

Information

Published : 2001-12-04 05:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0950

Mitre link : CVE-2001-0950

CVE.ORG link : CVE-2001-0950


JSON object : View

Products Affected

valicert

  • enterprise_validation_authority
CWE
CWE-331

Insufficient Entropy