Bug#445283: CVE-2006-6969 predictable session identifiers
nion at debian.org
Thu Oct 4 15:45:39 UTC 2007
the following CVE (Common Vulnerabilities & Exposures) id was
published for jetty.
| Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1
| before 6.1.0pre3 generates predictable session identifiers using
| java.util.random, which makes it easier for remote attackers to guess
| a session identifier through brute force attacks, bypass
| authentication requirements, and possibly conduct cross-site request
| forgery attacks.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
This vulnerability has been verified in the Debian versions
by the upstream.
I am currently waiting to get a patch for this.
For further information:
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-java-maintainers/attachments/20071004/3debde4c/attachment.pgp
More information about the pkg-java-maintainers