The software specifies permissions for a security-critical resource in a way that allows the resource to be read or modified by unintended actors.
bind-9.9.4/bin/tests/pkcs11/benchmarks/pubrsa.c
The highlighted line of code below is the trigger point of this particular Centos 7 misc weakness.
*/
/* $ Id$ */
/* pubrsa [-m module] [-s $ slot] [-p pin] [-t] [-n count] */
/*! \file */
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include <unistd.h>
#include <isc/commandline.h>
#include <isc/result.h>
#include <isc/types.h>
#include <pk11/pk11.h>
#include <pk11/result.h>
#if !(defined(HAVE_GETPASSPHRASE) || (defined (__SVR4) && defined (__sun)))
#define getpassphrase(x) getpass(x)
#endif
#ifndef HAVE_CLOCK_GETTIME
#ifndef CLOCK_REALTIME
#define CLOCK_REALTIME 0
#endif
int
clock_gettime(int32_t id, struct timespec *tp)
{
struct timeval tv;
int result;
result = gettimeofday(&tv, NULL);
if (result)
return (result);
tp->tv_sec = tv.tv_sec;
tp->tv_nsec = (long) tv.tv_usec * 1000;
return (result);
}
#endif
CK_BYTE modulus[] = {
0x00, 0xb7, 0x9c, 0x1f, 0x05, 0xa3, 0xc2, 0x99,
0x44, 0x82, 0x20, 0x78, 0x43, 0x7f, 0x5f, 0x3b,