The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/cherokee/issues/detail?id=1212 - Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html - | |
References | () http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz - Patch | |
References | () http://www.openwall.com/lists/oss-security/2011/06/03/4 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2011/06/06/21 - Patch | |
References | () http://www.securityfocus.com/bid/49772 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=713304 - Patch |
Information
Published : 2011-10-07 02:51
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2190
Mitre link : CVE-2011-2190
CVE.ORG link : CVE-2011-2190
JSON object : View
Products Affected
cherokee-project
- cherokee
CWE
CWE-310
Cryptographic Issues