The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418 - | |
References | () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0 - | |
References | () http://www.linuxsecurity.com/advisories/other_advisory-1483.html - | |
References | () http://www.osvdb.org/853 - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-051.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/advisories/3475 - | |
References | () http://www.securityfocus.com/archive/1/195829 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3004 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6823 - |
Information
Published : 2001-07-10 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1141
Mitre link : CVE-2001-1141
CVE.ORG link : CVE-2001-1141
JSON object : View
Products Affected
openssl
- openssl
ssleay
- ssleay
CWE