Vulnerabilities > CVE-2021-27211 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Steghide Project Steghide 0.5.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
References
- http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html
- http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html
- https://github.com/b4shfire/stegcrack
- https://github.com/b4shfire/stegcrack
- https://github.com/StefanoDeVuono/steghide
- https://github.com/StefanoDeVuono/steghide
- https://sourceforge.net/projects/steghide/files/steghide/0.5.1/
- https://sourceforge.net/projects/steghide/files/steghide/0.5.1/