Mandriva Linux Security Advisory : pwgen (MDVSA-2015:008)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Updated pwgen package fixes security vulnerabilities :

Pwgen was found to generate weak non-tty passwords by default, which
could be brute-forced with a commendable success rate, which could
raise security concerns (CVE-2013-4440).

Pwgen was found to silently falling back to use standard pseudo
generated numbers on the systems that heavily use entropy. Systems,
such as those with a lot of daemons providing encryption services, the
entropy was found to be exhausted, which forces pwgen to fall back to
use standard pseudo generated numbers (CVE-2013-4442).

See also :

http://advisories.mageia.org/MGASA-2014-0535.html

Solution :

Update the affected pwgen package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 80427 ()

Bugtraq ID: 63184
63185

CVE ID: CVE-2013-4440
CVE-2013-4442

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now