Vulnerability Name:

CVE-2001-1467 (CCN-6382)

Assigned:2001-04-11
Published:2001-04-11
Updated:2017-07-11
Summary:mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: BUGTRAQ
Type: UNKNOWN
20010411 flaw in RH ``mkpasswd'' command

Source: CCN
Type: BugTraq Mailing List, Wed Apr 11 2001 - 10:32:38 CDT
flaw in RH ``mkpasswd'' command

Source: BUGTRAQ
Type: UNKNOWN
20010412 Re: flaw in RH ``mkpasswd'' command (importance of seeds & algorithms)

Source: CCN
Type: BugTraq Mailing List, Thu Apr 12 2001 - 07:44:26 CDT
Re: flaw in RH ``mkpasswd'' command (importance of seeds & algorithms)

Source: CCN
Type: BugTraq Mailing List, Wed Apr 11 2001 - 18:55:27 CDT
Re: flaw in RH ``mkpasswd'' command

Source: CCN
Type: BugTraq Mailing List, Wed Apr 11 2001 - 19:02:45 CDT
Re: flaw in RH ``mkpasswd'' command

Source: MITRE
Type: CNA
CVE-2001-1467

Source: CCN
Type: SECTRACK ID: 1001303
The Expect Mkpasswd Utility Generates a Relatively Small Number of Passwords, Making Brute Force Password Guessing Attempts Easier

Source: SECTRACK
Type: UNKNOWN
1001303

Source: CCN
Type: US-CERT VU#527736
mkpasswd uses weak random number generator

Source: CERT-VN
Type: US Government Resource
VU#527736

Source: CCN
Type: OSVDB ID: 19138
expect mkpasswd on Red Hat Linux ProcessID Seed Weak Random Number Generation

Source: BID
Type: UNKNOWN
2632

Source: CCN
Type: BID-2632
Expect mkpasswd Biased Random Number Generation Vulnerability

Source: XF
Type: UNKNOWN
mkpasswd-weak-passwords(6382)

Source: XF
Type: UNKNOWN
mkpasswd-weak-passwords(6382)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:don_libes:expect:5.2.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    don_libes expect 5.2.8
    redhat linux 6.2
    redhat linux 7