Vulnerability Details : CVE-2001-1467
mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.
Exploit prediction scoring system (EPSS) score for CVE-2001-1467
Probability of exploitation activity in the next 30 days: 0.70%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1467
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1467
-
http://www.kb.cert.org/vuls/id/527736
US Government Resource
-
http://archives.neohapsis.com/archives/bugtraq/2001-04/0192.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/6382
-
http://securitytracker.com/id?1001303
-
http://www.securityfocus.com/bid/2632
-
http://archives.neohapsis.com/archives/bugtraq/2001-04/0173.html
Products affected by CVE-2001-1467
- cpe:2.3:a:don_libes:expect:5.2.8:*:*:*:*:*:*:*