Vulnerability Details : CVE-2008-0299
common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.
Exploit prediction scoring system (EPSS) score for CVE-2008-0299
Probability of exploitation activity in the next 30 days: 0.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-0299
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
[email protected] |
References for CVE-2008-0299
-
https://bugzilla.redhat.com/show_bug.cgi?id=428727
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00594.html
-
http://people.debian.org/~nion/nmu-diff/paramiko-1.6.4-1_1.6.4-1.1.patch
Exploit
-
http://www.securityfocus.com/bid/27307
-
http://security.gentoo.org/glsa/glsa-200803-07.xml
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39749
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00529.html
Products affected by CVE-2008-0299
- cpe:2.3:a:python_software_foundation:paramiko:1.7.1:*:*:*:*:*:*:*