First published: Mon Jan 14 2008(Updated: )
common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/1.7.1 | <3. | 3. |
pip/paramiko | <=1.7.1-2 | 1.7.1-3 |
Paramiko | =1.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0299 is classified as having moderate severity due to potential exposure of sensitive information between sessions.
To fix CVE-2008-0299, upgrade Paramiko to version 1.7.2 or later.
CVE-2008-0299 affects Paramiko versions 1.7.1 and earlier.
CVE-2008-0299 exploits a flaw in the RandomPool implementation in Paramiko, allowing session information leakage.
CVE-2008-0299 is found in Paramiko, specifically in version 1.7.1 and earlier.