Required CVE Record Information
Description
parcimonie before 0.8.1, when using a large keyring, sleeps for the same amount of time between fetches, which allows attackers to correlate key fetches via unspecified vectors.
References 7 Total
- https://gaffer.ptitcanardnoir.org/intrigeri/files/parcimonie/App-Parcimonie-0.8.1.tar.gz
- seclists.org: [oss-security] 20140210 Re: CVE request: parcimonie (0.6 to 0.8, included) possible correlation between key fetches mailing-list
- debian.org: DSA-2860 vendor-advisory
- exchange.xforce.ibmcloud.com: parcimonie-cve20141921-info-disc(91118) vdb-entry
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738134
- securityfocus.com: 65505 vdb-entry
- seclists.org: [oss-security] 20140210 CVE request: parcimonie (0.6 to 0.8, included) possible correlation between key fetches mailing-list
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- https://gaffer.ptitcanardnoir.org/intrigeri/files/parcimonie/App-Parcimonie-0.8.1.tar.gz x_transferred
- seclists.org: [oss-security] 20140210 Re: CVE request: parcimonie (0.6 to 0.8, included) possible correlation between key fetches mailing-listx_transferred
- debian.org: DSA-2860 vendor-advisoryx_transferred
- exchange.xforce.ibmcloud.com: parcimonie-cve20141921-info-disc(91118) vdb-entryx_transferred
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738134 x_transferred
- securityfocus.com: 65505 vdb-entryx_transferred
- seclists.org: [oss-security] 20140210 CVE request: parcimonie (0.6 to 0.8, included) possible correlation between key fetches mailing-listx_transferred