• Tenable
  • CVEs
  • Settings
    Links
    Tenable.io Tenable Community & Support Tenable University
    Severity
    Theme
  • Tenable
  • Links
  • Tenable.io
  • Tenable Community & Support
  • Tenable University
  • Settings
  • Severity
  • Theme
  • Newest
  • Updated
  • Search
  • Newest
  • Updated
  • Search
  1. CVEs
  2. CVE-2014-8242
  1. CVEs

CVE-2014-8242

medium
  • Information
  • CPEs
  • Plugins

Description

librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.

References

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151105.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152355.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152366.html

http://lists.opensuse.org/opensuse-updates/2015-10/msg00034.html

http://www.openwall.com/lists/oss-security/2014/07/28/1

http://www.openwall.com/lists/oss-security/2014/08/05/5

http://www.openwall.com/lists/oss-security/2014/10/13/2

https://bugzilla.redhat.com/show_bug.cgi?id=1126712

https://github.com/librsync/librsync/issues/5

https://github.com/librsync/librsync/releases/tag/v1.0.0

https://security.gentoo.org/glsa/201605-04

https://www.miknet.net/security/optimizing-birthday-attack/

Details

Source: MITRE

Published: 2015-10-26

Updated: 2020-05-19

Type: CWE-310

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

  • Tenable.com
  • Community & Support
  • Documentation
  • Education
  • © 2023 Tenable®, Inc. All Rights Reserved
  • Privacy Policy
  • Legal
  • 508 Compliance