Vulnerabilities > CVE-2012-2405 - Cryptographic Issues vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Gallery 2 before 2.3.2 and 3 before 3.0.3 does not properly implement encryption, which has unspecified impact and attack vectors, a different vulnerability than CVE-2012-1113.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 | |
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2
- http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2
- https://bugzilla.redhat.com/show_bug.cgi?id=812045
- https://bugzilla.redhat.com/show_bug.cgi?id=812045
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75201
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75201