First published: Wed Jun 26 2013(Updated: )
Michael Samuel (mik) reports: KRandom::random() should not be considered a secure PRNG due to having a limited space of random values (32bits). Reference: <a href="http://openwall.com/lists/oss-security/2013/06/26/1">http://openwall.com/lists/oss-security/2013/06/26/1</a> <a href="http://openwall.com/lists/oss-security/2013/06/26/2">http://openwall.com/lists/oss-security/2013/06/26/2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Paste Applet | >4.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2013-2213.
The severity of CVE-2013-2213 is medium with a CVSS score of 5.5.
The KDE Paste Applet after version 4.10.5 in kdeplasma-addons is affected by CVE-2013-2213.
The vulnerability in CVE-2013-2213 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output.
Yes, updating to a version of KDE Paste Applet after 4.10.5 in kdeplasma-addons will fix the vulnerability CVE-2013-2213.