A vulnerability, which was classified as problematic, has been found in enigmaX up to 2.2. This issue affects the function getSeed of the file main.c of the component Scrambling Table Handler. The manipulation leads to predictable seed in pseudo-random number generator (prng). The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.3 is able to address this issue. The identifier of the patch is 922bf90ca14a681629ba0b807a997a81d70225b5. It is recommended to upgrade the affected component. The identifier VDB-217181 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/pfmonville/enigmaX/commit/922bf90ca14a681629ba0b807a997a81d70225b5 | Patch Third Party Advisory |
https://github.com/pfmonville/enigmaX/releases/tag/2.3 | Release Notes Third Party Advisory |
https://vuldb.com/?ctiid.217181 | Third Party Advisory |
https://vuldb.com/?id.217181 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-01-02T07:59:38.347Z
Updated: 2023-10-20T09:50:09.346Z
Reserved: 2023-01-02T07:58:00.845Z
Link: CVE-2016-15006
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-02T08:15:10.033
Modified: 2024-05-17T01:08:08.153
Link: CVE-2016-15006
JSON object: View
Redhat Information
No data.
CWE