node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1327056 | Issue Tracking Patch Third Party Advisory |
https://nodesecurity.io/advisories/93 | Third Party Advisory |
https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d | Patch |
http://www.openwall.com/lists/oss-security/2016/04/13/8 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2020-01-30 13:15
Updated : 2020-02-05 09:26
NVD link : CVE-2015-8851
Mitre link : CVE-2015-8851
JSON object : View
CWE
CWE-331
Insufficient Entropy
Products Affected
node-uuid_project
- node-uuid