CVE-2013-0158 : Detail

CVE-2013-0158

0.7%V3
Network
2013-02-24
21h00 +00:00
2016-06-09
11h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE Other No informations.

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.6 AV:N/AC:H/Au:N/C:P/I:N/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Cloudbees>>Jenkins >> Version To (including) 1.480.3.1

Jenkins>>Jenkins >> Version 1.400

Jenkins>>Jenkins >> Version 1.401

Jenkins>>Jenkins >> Version 1.402

Jenkins>>Jenkins >> Version 1.403

Jenkins>>Jenkins >> Version 1.404

Jenkins>>Jenkins >> Version 1.405

Jenkins>>Jenkins >> Version 1.406

Jenkins>>Jenkins >> Version 1.407

Jenkins>>Jenkins >> Version 1.408

Jenkins>>Jenkins >> Version 1.409

Jenkins>>Jenkins >> Version 1.410

Jenkins>>Jenkins >> Version 1.411

Jenkins>>Jenkins >> Version 1.412

Jenkins>>Jenkins >> Version 1.413

Jenkins>>Jenkins >> Version 1.414

Jenkins>>Jenkins >> Version 1.415

Jenkins>>Jenkins >> Version 1.416

Jenkins>>Jenkins >> Version 1.417

Jenkins>>Jenkins >> Version 1.418

Jenkins>>Jenkins >> Version 1.419

Jenkins>>Jenkins >> Version 1.420

Jenkins>>Jenkins >> Version 1.421

Jenkins>>Jenkins >> Version 1.422

Jenkins>>Jenkins >> Version 1.423

Jenkins>>Jenkins >> Version 1.424

Jenkins>>Jenkins >> Version 1.425

Jenkins>>Jenkins >> Version 1.426

Jenkins>>Jenkins >> Version 1.427

Jenkins>>Jenkins >> Version 1.428

Jenkins>>Jenkins >> Version 1.429

Jenkins>>Jenkins >> Version 1.430

Jenkins>>Jenkins >> Version 1.431

Jenkins>>Jenkins >> Version 1.432

Jenkins>>Jenkins >> Version 1.433

Jenkins>>Jenkins >> Version 1.434

Jenkins>>Jenkins >> Version 1.435

Jenkins>>Jenkins >> Version 1.436

Jenkins>>Jenkins >> Version 1.437

Configuraton 0

Cloudbees>>Jenkins >> Version 1.466.1.2

Cloudbees>>Jenkins >> Version 1.466.2.1

Configuraton 0

Cloudbees>>Jenkins >> Version 1.400

Cloudbees>>Jenkins >> Version 1.424

Cloudbees>>Jenkins >> Version 1.447

Jenkins>>Jenkins >> Version To (including) 1.466.2

Jenkins>>Jenkins >> Version 1.409.1

Jenkins>>Jenkins >> Version 1.409.2

Jenkins>>Jenkins >> Version 1.409.3

Jenkins>>Jenkins >> Version 1.424.1

Jenkins>>Jenkins >> Version 1.424.2

Jenkins>>Jenkins >> Version 1.424.3

Jenkins>>Jenkins >> Version 1.424.4

Jenkins>>Jenkins >> Version 1.424.5

Jenkins>>Jenkins >> Version 1.424.6

Jenkins>>Jenkins >> Version 1.447.1

Jenkins>>Jenkins >> Version 1.447.2

Jenkins>>Jenkins >> Version 1.466.1

Configuraton 0

Cloudbees>>Jenkins >> Version 1.447.1.1

Cloudbees>>Jenkins >> Version 1.447.2.2

Cloudbees>>Jenkins >> Version 1.447.3.1

References

http://rhn.redhat.com/errata/RHSA-2013-0220.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2013/01/07/4
Tags : mailing-list, x_refsource_MLIST