Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-2681


Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.


Published

2012-09-28T17:55:00.787

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application trevor_mckay cumin ≤ 0.1.5192-4 Yes
Application trevor_mckay cumin 0.1.3160-1 Yes
Application trevor_mckay cumin 0.1.4369-1 Yes
Application trevor_mckay cumin 0.1.4410-2 Yes
Application trevor_mckay cumin 0.1.4494-1 Yes
Application trevor_mckay cumin 0.1.4794-1 Yes
Application trevor_mckay cumin 0.1.4916-1 Yes
Application trevor_mckay cumin 0.1.5098-2 Yes
Application trevor_mckay cumin 0.1.5192-1 Yes
Operating System redhat enterprise_mrg 2.0 Yes

References