The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://secunia.com/advisories/44709 | third party advisory vendor advisory |
https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5 | patch |
http://www.securityfocus.com/bid/47980 | third party advisory vdb entry |
http://www.kb.cert.org/vuls/id/178990 | patch third party advisory us government resource |