First published: Tue Jul 10 2001(Updated: )
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | =0.9.3 | |
OpenSSL OpenSSL | =0.9.1c | |
OpenSSL OpenSSL | =0.9.6 | |
OpenSSL OpenSSL | =0.9.6a | |
OpenSSL OpenSSL | =0.9.4 | |
Ssleay Ssleay | =0.9 | |
Ssleay Ssleay | =0.9.1 | |
Ssleay Ssleay | =0.8.1 | |
OpenSSL OpenSSL | =0.9.2b | |
OpenSSL OpenSSL | =0.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.