4
CVSSv2

CVE-2016-6345

Published: 07/09/2016 Updated: 08/09/2016
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat resteasy -

Vendor Advisories

Debian Bug report logs - #837170 CVE-2016-6345 / CVE-2016-6346 / CVE-2016-6347 / CVE-2016-6348 Package: src:resteasy; Maintainer for src:resteasy is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 9 Sep 2016 17:36:02 UTC Severity: im ...
It was found that there was insufficient use of randam values in RESTEasy async jobs An attacker could use this flaw to steal user data ...