| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Gentoo Linux. Impacted is the function docert. Such manipulation leads to cryptographic issue.
This vulnerability is uniquely identified as CVE-2008-1383. No exploit exists.
Upgrading the affected component is advised.
Details
A vulnerability was found in Gentoo Linux (version unknown). It has been rated as problematic. Affected by this issue is the function docert. The manipulation with an unknown input leads to a cryptographic issue vulnerability. Using CWE to declare the problem leads to CWE-310. Impacted is confidentiality. CVE summarizes:
The docert function in ssl-cert.eclass, when used by src_compile or src_install on Gentoo Linux, stores the SSL key in a binpkg, which allows local users to extract the key from the binpkg, and causes multiple systems that use this binpkg to have the same SSL key and certificate.
The bug was discovered 03/20/2008. The weakness was disclosed 04/16/2007 (Website). The advisory is shared for download at bugs.gentoo.org. This vulnerability is handled as CVE-2008-1383 since 03/18/2008. The attack needs to be approached locally. No form of authentication is required for exploitation. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1600.
The vulnerability scanner Nessus provides a plugin with the ID 31636 (GLSA-200803-30 : ssl-cert eclass: Certificate disclosure), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. A possible mitigation has been published 2 years after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (41336), Tenable (31636), SecurityFocus (BID 28350†), OSVDB (43479†) and Secunia (SA29436†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.0VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.0
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 31636
Nessus Name: GLSA-200803-30 : ssl-cert eclass: Certificate disclosure
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 60622
OpenVAS Name: Gentoo Security Advisory GLSA 200803-30 (ssl-cert.eclass)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Timeline
04/16/2007 🔍03/18/2008 🔍
03/18/2008 🔍
03/18/2008 🔍
03/20/2008 🔍
03/20/2008 🔍
03/20/2008 🔍
03/20/2008 🔍
03/20/2008 🔍
03/21/2008 🔍
03/25/2008 🔍
03/16/2015 🔍
08/07/2019 🔍
Sources
Advisory: bugs.gentoo.orgStatus: Not defined
Confirmation: 🔍
CVE: CVE-2008-1383 (🔍)
GCVE (CVE): GCVE-0-2008-1383
GCVE (VulDB): GCVE-100-41552
X-Force: 41336
SecurityFocus: 28350 - Gentoo 'ssl-cert' eclass Information Disclosure Vulnerability
Secunia: 29436 - Gentoo Multiple ebuilds ssl-cert eclass "docert()" Security Issue, Less Critical
OSVDB: 43479 - Gentoo Linuxssl-cert.eclass docert Function binpkg Local SSL Key Disclosure
Vulnerability Center: 17999 - Gentoo Linux Src_compile and Src_install Vulnerabilities Allow Local Users to Read Private SSL Keys, Low
Entry
Created: 03/16/2015 17:00Updated: 08/07/2019 16:49
Changes: 03/16/2015 17:00 (78), 08/07/2019 16:49 (3)
Complete: 🔍
Cache ID: 216:FA7:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.