CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
75.6%
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Vendor | Product | Version | CPE |
---|---|---|---|
openssl | openssl | 0.9.1c | cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* |
openssl | openssl | 0.9.2b | cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* |
openssl | openssl | 0.9.3 | cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* |
openssl | openssl | 0.9.4 | cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* |
openssl | openssl | 0.9.5 | cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6 | cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6a | cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* |
ssleay | ssleay | 0.8.1 | cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:* |
ssleay | ssleay | 0.9 | cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:* |
ssleay | ssleay | 0.9.1 | cpe:2.3:a:ssleay:ssleay:0.9.1:*:*:*:*:*:*:* |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418
www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0
www.linuxsecurity.com/advisories/other_advisory-1483.html
www.osvdb.org/853
www.redhat.com/support/errata/RHSA-2001-051.html
www.securityfocus.com/advisories/3475
www.securityfocus.com/archive/1/195829
www.securityfocus.com/bid/3004
exchange.xforce.ibmcloud.com/vulnerabilities/6823