CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
72.7%
Debian Security Advisory DSA-2541-1 [email protected]
http://www.debian.org/security/ Raphael Geissert
September 07, 2012 http://www.debian.org/security/faq
Package : beaker
Vulnerability : information disclosure
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-3458
Debian Bug : 684890
It was discovered that Beaker, a cache and session library for Python,
when using the python-crypto backend, is vulnerable to information
disclosure due to a cryptographic weakness related to the use of the
AES cipher in ECB mode.
Systems that have the python-pycryptopp package should not be
vulnerable, as this backend is preferred over python-crypto.
After applying this update, existing sessions will be invalidated.
For the stable distribution (squeeze), this problem has been fixed in
version 1.5.4-4+squeeze1.
For the testing distribution (wheezy), and the unstable distribution
(sid), this problem has been fixed in version 1.6.3-1.1.
We recommend that you upgrade your beaker packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | all | python-beaker | < 1.5.4-4+squeeze1 | python-beaker_1.5.4-4+squeeze1_all.deb |
Debian | 6 | all | python3-beaker | < 1.5.4-4+squeeze1 | python3-beaker_1.5.4-4+squeeze1_all.deb |
Debian | 6 | all | beaker | < 1.5.4-4+squeeze1 | beaker_1.5.4-4+squeeze1_all.deb |