First published: Mon Jun 13 2016(Updated: )
A password generation weakness exists in xquest through 2016-06-13.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ethz xquest | <=2016-06-13 | |
Fedora | =23 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4980 has been rated as having a moderate severity due to its potential to expose user passwords.
To fix CVE-2016-4980, upgrade to a version of xquest released after June 13, 2016 that addresses the password generation weakness.
CVE-2016-4980 affects xquest versions through 2016-06-13, Fedora 23, and Red Hat Enterprise Linux versions 6.0 and 7.0.
The root cause of CVE-2016-4980 is inadequate randomness in the password generation process implemented in the xguest RPM post-install script.
Yes, CVE-2016-4980 can potentially lead to password-related attacks due to predictable passwords being generated.