Search criteria
3 vulnerabilities found for cryptiles by cryptiles_project
FKIE_CVE-2018-1000620
Vulnerability from fkie_nvd - Published: 2018-07-09 20:29 - Updated: 2024-11-21 03:40
Severity ?
Summary
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/hapijs/cryptiles/issues/34 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://github.com/hapijs/cryptiles/issues/35 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/hapijs/cryptiles/issues/34 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/hapijs/cryptiles/issues/35 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cryptiles_project | cryptiles | * | |
| cryptiles_project | cryptiles | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptiles_project:cryptiles:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6FEFB7-2721-4CBD-A604-51B47DCBA338",
"versionEndExcluding": "3.1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cryptiles_project:cryptiles:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F53B05E2-7458-4763-A1C8-4A7B69CCFB09",
"versionEndExcluding": "4.1.2",
"versionStartIncluding": "4.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2."
},
{
"lang": "es",
"value": "cryptiles, de Eran Hammer, en versiones 4.1.1 y anteriores contiene una vulnerabilidad CWE-331: entrop\u00eda insuficiente en el m\u00e9todo randomDigits() que puede resultar en que un atacante pueda forzar algo que deber\u00eda ser aleatorio. Este ataque parece ser explotable mediante la aplicaci\u00f3n que llama. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 4.1.2."
}
],
"id": "CVE-2018-1000620",
"lastModified": "2024-11-21T03:40:14.987",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-09T20:29:00.737",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/hapijs/cryptiles/issues/35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/hapijs/cryptiles/issues/35"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-331"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-1000620 (GCVE-0-2018-1000620)
Vulnerability from cvelistv5 – Published: 2018-07-09 20:00 – Updated: 2024-09-16 18:45
VLAI?
Summary
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:40:47.561Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/hapijs/cryptiles/issues/35"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"dateAssigned": "2018-07-08T00:00:00",
"datePublic": "2018-06-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-31T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"url": "https://github.com/hapijs/cryptiles/issues/35"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-1000620",
"datePublished": "2018-07-09T20:00:00Z",
"dateReserved": "2018-07-09T00:00:00Z",
"dateUpdated": "2024-09-16T18:45:19.030Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-1000620 (GCVE-0-2018-1000620)
Vulnerability from nvd – Published: 2018-07-09 20:00 – Updated: 2024-09-16 18:45
VLAI?
Summary
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:40:47.561Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/hapijs/cryptiles/issues/35"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"dateAssigned": "2018-07-08T00:00:00",
"datePublic": "2018-06-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-31T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"url": "https://github.com/hapijs/cryptiles/issues/35"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-1000620",
"datePublished": "2018-07-09T20:00:00Z",
"dateReserved": "2018-07-09T00:00:00Z",
"dateUpdated": "2024-09-16T18:45:19.030Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}