Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote malicious users to guess the session key.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
trevor mckay cumin 0.1.4494-1 |
||
trevor mckay cumin 0.1.4794-1 |
||
trevor mckay cumin 0.1.4916-1 |
||
trevor mckay cumin 0.1.5098-2 |
||
trevor mckay cumin |
||
trevor mckay cumin 0.1.3160-1 |
||
trevor mckay cumin 0.1.5192-1 |
||
redhat enterprise mrg 2.0 |
||
trevor mckay cumin 0.1.4369-1 |
||
trevor mckay cumin 0.1.4410-2 |