First published: Mon Mar 03 2003(Updated: )
A patch for mcookie in the util-linux package for Mandrake Linux 8.2 and 9.0 uses /dev/urandom instead of /dev/random, which causes mcookie to use an entropy source that is more predictable than expected, which may make it easier for certain types of attacks to succeed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
util-linux | =2.11u | |
util-linux | =2.11n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0094 is considered a moderate severity vulnerability due to its potential to expose predictable entropy in cryptographic operations.
To fix CVE-2003-0094, update the util-linux package to a version that does not use /dev/urandom for mcookie.
CVE-2003-0094 affects users of Mandrake Linux versions 8.2 and 9.0 that utilize the vulnerable versions of the util-linux package.
CVE-2003-0094 may facilitate attacks that rely on predictable random number generation, impacting cryptographic security.
CVE-2003-0094 was published on January 9, 2003.