Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2012/11/10/1 - | |
References | () https://bugs.launchpad.net/zope2/+bug/1071067 - Exploit | |
References | () https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt - | |
References | () https://plone.org/products/plone-hotfix/releases/20121124 - | |
References | () https://plone.org/products/plone/security/advisories/20121106/24 - Vendor Advisory |
Information
Published : 2014-11-03 22:55
Updated : 2024-11-21 01:46
NVD link : CVE-2012-6661
Mitre link : CVE-2012-6661
CVE.ORG link : CVE-2012-6661
JSON object : View
Products Affected
zope
- zope
plone
- plone
CWE
CWE-310
Cryptographic Issues