OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/1340 | Patch Vendor Advisory |
http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/1340 | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/1340 - Patch, Vendor Advisory |
Information
Published : 2000-06-12 04:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0535
Mitre link : CVE-2000-0535
CVE.ORG link : CVE-2000-0535
JSON object : View
Products Affected
openssl
- openssl
freebsd
- freebsd
CWE