CVE-2024-45751

tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.
Configurations

No configuration.

History

30 Nov 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/11/msg00033.html -

25 Nov 2024, 20:15

Type Values Removed Values Added
CWE CWE-338
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

21 Nov 2024, 09:38

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/09/07/2 -

10 Sep 2024, 12:15

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2024/09/07/2 -

06 Sep 2024, 12:08

Type Values Removed Values Added
Summary
  • (es) tgt (también conocido como Linux Target Framework) antes de la versión 1.0.93 intenta lograr entropía llamando a rand sin srand. La semilla PRNG siempre es 1 y, por lo tanto, la secuencia de desafíos siempre es idéntica.

06 Sep 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-06 05:15

Updated : 2024-11-30 12:15


NVD link : CVE-2024-45751

Mitre link : CVE-2024-45751

CVE.ORG link : CVE-2024-45751


JSON object : View

Products Affected

No product.

CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)