The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/3004 | vdb entry patch vendor advisory |
http://www.securityfocus.com/advisories/3475 | vendor advisory |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6823 | vdb entry |
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0 | vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418 | vendor advisory |
http://www.securityfocus.com/archive/1/195829 | mailing list patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2001-051.html | patch vendor advisory |
http://www.osvdb.org/853 | vdb entry |
http://www.linuxsecurity.com/advisories/other_advisory-1483.html | vendor advisory |