Show plain JSON{"id": "CVE-2012-2146", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-08-26T21:55:01.840", "references": [{"url": "http://elixir.ematia.de/trac/ticket/119", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/27/8", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/28/2", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/29/1", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013", "source": "secalert@redhat.com"}, {"url": "http://elixir.ematia.de/trac/ticket/119", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/27/8", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/28/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/04/29/1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database."}, {"lang": "es", "value": "Elixir v0.8.0 utiliza Blowfish en el modo CFB \r\nsin construir un vector \u00fanico de inicializaci\u00f3n (IV), lo cual hace que sea m\u00e1s f\u00e1cil para los usuarios dependientes de contexto obtener la informaci\u00f3n sensible y descifrar la base de datos."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ematia:elixir:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E59B38E-34AD-432F-B054-B6E6AA0CE2FF"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}