Versio.io

CVE-2012-2681

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 19-09-2012 02:00
Last modified: - 19-09-2012 02:00
Total changes: - 11

Description

CVE-2012-2681 cumin: weak session keys

Common Vulnerability Scoring System (CVSS)

AV:N/AC:M/Au:N/C:P/I:P/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
5.8
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=condor-0 AND versionEndExcluding=7.6.5-0.22.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=condor-wallaby-0 AND versionEndExcluding=4.1.3-1.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=condor-wallaby-base-db-0 AND versionEndExcluding=1.23-1.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=cumin-0 AND versionEndExcluding=0.1.5444-3.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=sesame-0 AND versionEndExcluding=1.0-4.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=wallaby-0 AND versionEndExcluding=0.12.5-10.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=condor-0 AND versionEndExcluding=7.6.5-0.22.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=condor-wallaby-0 AND versionEndExcluding=4.1.3-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=condor-wallaby-base-db-0 AND versionEndExcluding=1.23-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=cumin-0 AND versionEndExcluding=0.1.5444-3.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=deltacloud-core-0 AND versionEndExcluding=0.5.0-10.el6_2
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=libdeltacloud-0 AND versionEndExcluding=0.9-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-daemons-0 AND versionEndExcluding=1.1.4-2.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-eventmachine-0 AND versionEndExcluding=0.12.10-7.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-fssm-0 AND versionEndExcluding=0.2.7-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-haml-0 AND versionEndExcluding=3.1.2-2.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-hpricot-0 AND versionEndExcluding=0.8.4-2.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-json-0 AND versionEndExcluding=1.4.6-10.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-maruku-0 AND versionEndExcluding=0.6.0-4.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-mime-types-0 AND versionEndExcluding=1.16-4.el6_0
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-mocha-0 AND versionEndExcluding=0.9.7-4.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-net-ssh-0 AND versionEndExcluding=2.0.23-6.el6_0
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-nokogiri-0 AND versionEndExcluding=1.5.0-0.8.beta4.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-rack-1 AND versionEndExcluding=1.3.0-2.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-rack-accept-0 AND versionEndExcluding=0.4.3-6.el6_0
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-rack-test-0 AND versionEndExcluding=0.6.1-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-rake-0 AND versionEndExcluding=0.8.7-2.1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-rest-client-0 AND versionEndExcluding=1.6.1-2.el6_0
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygems-0 AND versionEndExcluding=1.8.16-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-sass-0 AND versionEndExcluding=3.1.4-4.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-sinatra-1 AND versionEndExcluding=1.2.6-2.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-syntax-0 AND versionEndExcluding=1.0.0-4.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-thin-0 AND versionEndExcluding=1.2.11-3.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-tilt-0 AND versionEndExcluding=1.3.2-3.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=rubygem-yard-0 AND versionEndExcluding=0.7.2-1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=sesame-0 AND versionEndExcluding=1.0-6.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=wallaby-0 AND versionEndExcluding=0.12.5-10.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=2
AND
product=cumin AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_mrg AND version=1
 

Reference

 


Keywords

REDHAT

 

CVE-2012-2681

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.