Name | CVE-2013-4442 |
Description | Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 767008 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
pwgen (PTS) | jessie | 2.07-1 | fixed |
| stretch | 2.07-1.1 | fixed |
| buster | 2.08-1 | fixed |
| sid, trixie, bullseye, bookworm | 2.08-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
pwgen | source | (unstable) | 2.07-1 | unimportant | | 767008 |
Notes
/dev/random is universally available, if an attacker can create an environment
where it's not available that opens a far bigger can of worms