steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
References
Link | Resource |
---|---|
https://sourceforge.net/projects/steghide/files/steghide/0.5.1/ | Release Notes Third Party Advisory |
https://github.com/b4shfire/stegcrack | Product |
https://github.com/StefanoDeVuono/steghide | Product |
http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2021-02-15 11:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-27211
Mitre link : CVE-2021-27211
JSON object : View
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
Products Affected
steghide_project
- steghide