First published: Fri Sep 28 2012(Updated: )
Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trevor Mckay Cumin | <=0.1.5192-4 | |
Trevor Mckay Cumin | =0.1.3160-1 | |
Trevor Mckay Cumin | =0.1.4369-1 | |
Trevor Mckay Cumin | =0.1.4410-2 | |
Trevor Mckay Cumin | =0.1.4494-1 | |
Trevor Mckay Cumin | =0.1.4794-1 | |
Trevor Mckay Cumin | =0.1.4916-1 | |
Trevor Mckay Cumin | =0.1.5098-2 | |
Trevor Mckay Cumin | =0.1.5192-1 | |
Redhat Enterprise Mrg | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.