ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=100749428517090&w=2 | Exploit Mailing List |
http://www.securityfocus.com/bid/3618 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.securityfocus.com/bid/3620 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.valicert.com/support/security_advisory_eva.html | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2001-12-04 05:00
Updated : 2024-02-15 03:29
NVD link : CVE-2001-0950
Mitre link : CVE-2001-0950
CVE.ORG link : CVE-2001-0950
JSON object : View
Products Affected
valicert
- enterprise_validation_authority
CWE
CWE-331
Insufficient Entropy