Vulnerabilities > CVE-2015-8851 - Insufficient Entropy vulnerability in Node-Uuid Project Node-Uuid
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
Redhat
rpms |
|
References
- http://www.openwall.com/lists/oss-security/2016/04/13/8
- http://www.openwall.com/lists/oss-security/2016/04/13/8
- https://bugzilla.redhat.com/show_bug.cgi?id=1327056
- https://bugzilla.redhat.com/show_bug.cgi?id=1327056
- https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d
- https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d
- https://nodesecurity.io/advisories/93
- https://nodesecurity.io/advisories/93