Vulnerability CVE-2001-1141


Published: 2001-07-10   Modified: 2012-02-12

Description:
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Ssleay -> Ssleay 
Openssl -> Openssl 

 References:
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0
http://www.linuxsecurity.com/advisories/other_advisory-1483.html
http://www.redhat.com/support/errata/RHSA-2001-051.html
http://www.securityfocus.com/advisories/3475
http://www.securityfocus.com/archive/1/195829
http://www.securityfocus.com/bid/3004
https://exchange.xforce.ibmcloud.com/vulnerabilities/6823

Copyright 2024, cxsecurity.com

 

Back to Top