First published: Mon Apr 02 2012(Updated: )
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/beaker | <1.6.4 | 1.6.4 |
Red Hat Python-beaker | <=1.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3458 has a moderate severity rating due to the vulnerabilities in session data encryption.
To fix CVE-2012-3458, upgrade to Beaker version 1.6.4 or later to avoid the weak AES ECB mode.
CVE-2012-3458 is vulnerable due to the use of AES in ECB mode for session encryption, which can expose sensitive data.
Beaker versions prior to 1.6.4 are affected by CVE-2012-3458.
Yes, attackers can exploit CVE-2012-3458 remotely to obtain portions of sensitive session data.