Vulnerabilities > CVE-2003-0094 - Unspecified vulnerability in Andries Brouwer Util-Linux 2.11N/2.11U
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN andries-brouwer
nessus
Summary
A patch for mcookie in the util-linux package for Mandrake Linux 8.2 and 9.0 uses /dev/urandom instead of /dev/random, which causes mcookie to use an entropy source that is more predictable than expected, which may make it easier for certain types of attacks to succeed.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2003-016.NASL |
description | The util-linux package provides the mcookie utility, a tool for generating random cookies that can be used for X authentication. The util-linux packages that were distributed with Mandrake Linux 8.2 and 9.0 had a patch that made it use /dev/urandom instead of /dev/random, which resulted in the mcookie being more predictable than it would otherwise be. This patch has been removed in these updates, giving mcookie a better source of entropy and making the generated cookies less predictable. Thanks to Dirk Mueller for pointing this out. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14001 |
published | 2004-07-31 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14001 |
title | Mandrake Linux Security Advisory : util-linux (MDKSA-2003:016) |
code |
|
References
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:016
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:016
- http://www.securityfocus.com/bid/6855
- http://www.securityfocus.com/bid/6855
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11318