steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html | Third Party Advisory VDB Entry |
https://github.com/StefanoDeVuono/steghide | Product |
https://github.com/b4shfire/stegcrack | Product |
https://sourceforge.net/projects/steghide/files/steghide/0.5.1/ | Release Notes Third Party Advisory |
http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html | Third Party Advisory VDB Entry |
https://github.com/StefanoDeVuono/steghide | Product |
https://github.com/b4shfire/stegcrack | Product |
https://sourceforge.net/projects/steghide/files/steghide/0.5.1/ | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/StefanoDeVuono/steghide - Product | |
References | () https://github.com/b4shfire/stegcrack - Product | |
References | () https://sourceforge.net/projects/steghide/files/steghide/0.5.1/ - Release Notes, Third Party Advisory |
Information
Published : 2021-02-15 19:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27211
Mitre link : CVE-2021-27211
CVE.ORG link : CVE-2021-27211
JSON object : View
Products Affected
steghide_project
- steghide
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)