CVE-2018-9057
Summary
| CVE | CVE-2018-9057 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-27 18:29:00 UTC |
| Updated | 2018-04-24 12:08:00 UTC |
| Description | aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password. |
Risk And Classification
Problem Types: CWE-332
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix password generation in resourceAwsIamUserLoginProfile by KellerFuchs · Pull Request #3934 · hashicorp/terraform-provider-aws · GitHub | MISC | github.com | Issue Tracking, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.