steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html | Third Party Advisory VDB Entry |
https://github.com/StefanoDeVuono/steghide | Product |
https://github.com/b4shfire/stegcrack | Product |
https://sourceforge.net/projects/steghide/files/steghide/0.5.1/ | Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-15 19:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-27211
Mitre link : CVE-2021-27211
CVE.ORG link : CVE-2021-27211
JSON object : View
Products Affected
steghide_project
- steghide
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)