CVE-2011-4121Inadequate Encryption Strength in Ruby

Severity
9.8CRITICALNVD
EPSS
0.1%
top 72.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 26
Latest updateApr 22

Description

The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt integrity of services, depending on strong private RSA keys generation mechanism.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5openssl/openssl_extension_of_rubyversions after 2011-09-01 up to 2011-11-03
NVDruby-lang/ruby1.8.7.3341.9.3

🔴Vulnerability Details

2
GHSA
GHSA-mjg4-5rfj-952f: The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private2022-04-22
CVEList
CVE-2011-4121: The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private2019-11-26

📋Vendor Advisories

1
Red Hat
extension): Insecure way of creation exponent value by private RSA key generation2011-11-03

💬Community

1
Bugzilla
CVE-2011-4121 ruby (openssl extension): Insecure way of creation exponent value by private RSA key generation2011-11-07
CVE-2011-4121 — Inadequate Encryption Strength in Ruby | cvebase