CVE-2012-6661 (GCVE-0-2012-6661)
Vulnerability from cvelistv5 – Published: 2014-11-03 22:00 – Updated: 2024-09-16 23:22
VLAI?
Summary
Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:02.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.launchpad.net/zope2/+bug/1071067"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://plone.org/products/plone/security/advisories/20121106/24"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://plone.org/products/plone-hotfix/releases/20121124"
},
{
"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-11-03T22:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.launchpad.net/zope2/+bug/1071067"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://plone.org/products/plone/security/advisories/20121106/24"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://plone.org/products/plone-hotfix/releases/20121124"
},
{
"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt",
"refsource": "CONFIRM",
"url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
},
{
"name": "https://bugs.launchpad.net/zope2/+bug/1071067",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/zope2/+bug/1071067"
},
{
"name": "https://plone.org/products/plone/security/advisories/20121106/24",
"refsource": "CONFIRM",
"url": "https://plone.org/products/plone/security/advisories/20121106/24"
},
{
"name": "https://plone.org/products/plone-hotfix/releases/20121124",
"refsource": "CONFIRM",
"url": "https://plone.org/products/plone-hotfix/releases/20121124"
},
{
"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6661",
"datePublished": "2014-11-03T22:00:00Z",
"dateReserved": "2014-11-03T00:00:00Z",
"dateUpdated": "2024-09-16T23:22:11.470Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.2.2\", \"matchCriteriaId\": \"17D1DF1B-1EAE-4B2E-89D5-A97301AE3164\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A2A9AE1-47C9-4073-BC2C-08C62874FFF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3802A1E1-0816-449E-858E-20039F4ED5DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC1E9D9C-97A0-4093-9492-493B1B4CD4B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4099B8D1-1F79-4BFB-943E-158E7394D90B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA0E119C-876F-4226-AF5F-44763EEBA29A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4937F4A-147C-4AD8-BB88-C3C3C9C8ADBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"035E2851-A3D4-4E90-8602-F500DC469C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BDEAEAC-3B26-4C95-865C-326ACD793133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA5D3643-BFBB-48BE-802C-D6CD940945F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3FC29D0-66F9-4A1A-86A6-8FD427825112\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E33FEC-33DA-45AC-8095-0D3C74FADC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FC93EC3-FE5D-410E-8DE5-2346D839F56C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67D4EB7F-BC46-4F2E-B065-303961C47B1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08747064-EC22-40B4-92EF-4640788FE55D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4EB85E3-9A76-4B79-AF7D-91484784A2EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78755057-2613-4D5E-8F59-2C117EE282B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D49359CD-63EF-4D3A-92DC-C16DEE88138B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DE940BA-B784-4193-AB77-333F15B6C32D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9762C674-380B-4831-BBA1-3B27742121B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D938645-80CE-4287-830E-A3BD0C5C84FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB0F7BFC-DC20-46B3-90E7-264E3A8A7886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C09C10-AEA0-41F4-B964-507B40580BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B60568E-A688-46AF-B627-062A029A7324\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B635DAD-AC53-4484-8750-200B662DAFD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B647E76-E8B8-4329-8848-3B90EB262807\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D0A6B8F-4018-44DC-9862-45309619DC6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F10374F-2BB3-48D2-B19F-9B2D038A8E35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEAC4F93-D26C-48F3-A7FF-8DC008FC2671\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"552661B7-093D-4B3C-8770-FCDE6032AA17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5180F9D2-E44B-455D-968C-792026AC832A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"636226E4-B880-41FE-A727-EF56CF8E6249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF6E934A-C344-4861-8CD4-D18D52672D5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25780BBE-8013-4100-9EA8-7EFC244399A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A089ED64-07E6-4F4C-97AE-AF74269A4DB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF2334C9-9B34-4C7D-93A2-172E596E05C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"354046F4-FA55-4AFC-935A-C803D36CDE86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF1496A7-6D0A-4970-B0BF-83758065BC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47DEF57C-92F0-4999-AF8E-CEE27EE92CD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BED4241-D823-402A-A389-7E52C410E2F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE9A55E6-F265-4BB8-8683-3E0CFA01EC73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970FD910-50A4-478A-ADE6-EB912C261DAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A490523-1063-44E4-A72A-C23070279181\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8559F17-63D1-45DB-8A28-47F729DC6686\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDC93803-6506-4382-A013-18010EE7E06B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E65977FD-A880-4D16-B56B-94A72774F42D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EA5B4F8-2155-403D-97D8-1272285D508B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3CA2943-77E5-4384-A019-415BBCE62F94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"538A3519-5B04-4FE5-A3C0-FD26EFA32705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08F4534-A588-463F-A745-39E559AB1CB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64341BA-5722-415E-9771-9837168AB7C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2929227-AE19-428D-9AC3-D312A559039B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B6DC866-0FEE-475B-855C-A69E004810CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50BF3E8E-152C-4E89-BAA2-A952D10F4611\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49DB97A7-89DD-43C0-A490-84AA7069764B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C44B53B-953B-4522-A5B4-11573850D2CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47321B60-67DA-4543-B173-D629A9569B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58B36EB2-723F-4E25-8018-EEB2BE806D9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7962EF74-6AC1-424C-A202-163AFDADA971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F1818BB-E23A-4136-898D-1D0C80C08728\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CB06627-133A-40D1-8816-E31E0A9BAD22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE168A35-1A46-4A6F-8A08-25CDD886066D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.13.18\", \"matchCriteriaId\": \"9C49083E-AD3B-47DD-A66B-911912EF46B3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).\"}, {\"lang\": \"es\", \"value\": \"Zope anterior a 2.13.19, utilizado en Plone anterior a 4.2.3 y 4.3 anterior a beta 1, no resiembra el generador de n\\u00fameros seudo aleatorios (PRNG), lo que facilita a atacantes remotos adivinar el valor a trav\\u00e9s de vectores no especificados. NOTA: este problema fue dividido (SPLIT) de CVE-2012-5508 debido a tipos diferentes de vulnerabilidades (ADT2).\"}]",
"id": "CVE-2012-6661",
"lastModified": "2024-11-21T01:46:38.470",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-11-03T22:55:05.930",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/10/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugs.launchpad.net/zope2/+bug/1071067\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://plone.org/products/plone-hotfix/releases/20121124\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://plone.org/products/plone/security/advisories/20121106/24\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/10/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.launchpad.net/zope2/+bug/1071067\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://plone.org/products/plone-hotfix/releases/20121124\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://plone.org/products/plone/security/advisories/20121106/24\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-6661\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-11-03T22:55:05.930\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).\"},{\"lang\":\"es\",\"value\":\"Zope anterior a 2.13.19, utilizado en Plone anterior a 4.2.3 y 4.3 anterior a beta 1, no resiembra el generador de n\u00fameros seudo aleatorios (PRNG), lo que facilita a atacantes remotos adivinar el valor a trav\u00e9s de vectores no especificados. NOTA: este problema fue dividido (SPLIT) de CVE-2012-5508 debido a tipos diferentes de vulnerabilidades (ADT2).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.2\",\"matchCriteriaId\":\"17D1DF1B-1EAE-4B2E-89D5-A97301AE3164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2A9AE1-47C9-4073-BC2C-08C62874FFF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3802A1E1-0816-449E-858E-20039F4ED5DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC1E9D9C-97A0-4093-9492-493B1B4CD4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4099B8D1-1F79-4BFB-943E-158E7394D90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0E119C-876F-4226-AF5F-44763EEBA29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4937F4A-147C-4AD8-BB88-C3C3C9C8ADBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035E2851-A3D4-4E90-8602-F500DC469C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDEAEAC-3B26-4C95-865C-326ACD793133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA5D3643-BFBB-48BE-802C-D6CD940945F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3FC29D0-66F9-4A1A-86A6-8FD427825112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E33FEC-33DA-45AC-8095-0D3C74FADC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FC93EC3-FE5D-410E-8DE5-2346D839F56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67D4EB7F-BC46-4F2E-B065-303961C47B1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08747064-EC22-40B4-92EF-4640788FE55D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EB85E3-9A76-4B79-AF7D-91484784A2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78755057-2613-4D5E-8F59-2C117EE282B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49359CD-63EF-4D3A-92DC-C16DEE88138B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE940BA-B784-4193-AB77-333F15B6C32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9762C674-380B-4831-BBA1-3B27742121B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D938645-80CE-4287-830E-A3BD0C5C84FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0F7BFC-DC20-46B3-90E7-264E3A8A7886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C09C10-AEA0-41F4-B964-507B40580BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B60568E-A688-46AF-B627-062A029A7324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B635DAD-AC53-4484-8750-200B662DAFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B647E76-E8B8-4329-8848-3B90EB262807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0A6B8F-4018-44DC-9862-45309619DC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F10374F-2BB3-48D2-B19F-9B2D038A8E35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEAC4F93-D26C-48F3-A7FF-8DC008FC2671\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552661B7-093D-4B3C-8770-FCDE6032AA17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5180F9D2-E44B-455D-968C-792026AC832A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"636226E4-B880-41FE-A727-EF56CF8E6249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF6E934A-C344-4861-8CD4-D18D52672D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25780BBE-8013-4100-9EA8-7EFC244399A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A089ED64-07E6-4F4C-97AE-AF74269A4DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2334C9-9B34-4C7D-93A2-172E596E05C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354046F4-FA55-4AFC-935A-C803D36CDE86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1496A7-6D0A-4970-B0BF-83758065BC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DEF57C-92F0-4999-AF8E-CEE27EE92CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BED4241-D823-402A-A389-7E52C410E2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9A55E6-F265-4BB8-8683-3E0CFA01EC73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970FD910-50A4-478A-ADE6-EB912C261DAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A490523-1063-44E4-A72A-C23070279181\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8559F17-63D1-45DB-8A28-47F729DC6686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDC93803-6506-4382-A013-18010EE7E06B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E65977FD-A880-4D16-B56B-94A72774F42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EA5B4F8-2155-403D-97D8-1272285D508B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CA2943-77E5-4384-A019-415BBCE62F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538A3519-5B04-4FE5-A3C0-FD26EFA32705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08F4534-A588-463F-A745-39E559AB1CB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64341BA-5722-415E-9771-9837168AB7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2929227-AE19-428D-9AC3-D312A559039B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B6DC866-0FEE-475B-855C-A69E004810CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50BF3E8E-152C-4E89-BAA2-A952D10F4611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DB97A7-89DD-43C0-A490-84AA7069764B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C44B53B-953B-4522-A5B4-11573850D2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47321B60-67DA-4543-B173-D629A9569B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58B36EB2-723F-4E25-8018-EEB2BE806D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7962EF74-6AC1-424C-A202-163AFDADA971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F1818BB-E23A-4136-898D-1D0C80C08728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB06627-133A-40D1-8816-E31E0A9BAD22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE168A35-1A46-4A6F-8A08-25CDD886066D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.13.18\",\"matchCriteriaId\":\"9C49083E-AD3B-47DD-A66B-911912EF46B3\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/10/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.launchpad.net/zope2/+bug/1071067\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://plone.org/products/plone-hotfix/releases/20121124\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://plone.org/products/plone/security/advisories/20121106/24\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/zope2/+bug/1071067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://plone.org/products/plone-hotfix/releases/20121124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://plone.org/products/plone/security/advisories/20121106/24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…