CVE Vulnerabilities

CVE-2023-49343

Predictable Seed in Pseudo-Random Number Generator (PRNG)

Published: Dec 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

Weakness

A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.

Affected Software

Name Vendor Start Version End Version
Budgie_extras Ubuntubudgie 1.4.0 (including) 1.7.1 (excluding)
Budgie-extras Ubuntu bionic *
Budgie-extras Ubuntu jammy *
Budgie-extras Ubuntu lunar *
Budgie-extras Ubuntu mantic *
Budgie-extras Ubuntu trusty *
Budgie-extras Ubuntu xenial *

Potential Mitigations

References