Upstream information
Description
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 |
| Patchnames: SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5 GA python-Beaker-1.6.4-0.7.1 |
SUSE OpenStack Cloud 6 |
| Patchnames: SUSE OpenStack Cloud 6 GA python-Beaker-1.6.4-0.7.3 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-10317 openSUSE-Tumbleweed-2024-11203 openSUSE-Tumbleweed-2024-13886 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 12:56:08 2013CVE page last modified: Tue Sep 3 18:19:13 2024