First published: Tue Jul 10 2001(Updated: )
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.3 | |
OpenSSL libcrypto | =0.9.1c | |
OpenSSL libcrypto | =0.9.6 | |
OpenSSL libcrypto | =0.9.6a | |
OpenSSL libcrypto | =0.9.4 | |
SSLeay | =0.9 | |
SSLeay | =0.9.1 | |
SSLeay | =0.8.1 | |
OpenSSL libcrypto | =0.9.2b | |
OpenSSL libcrypto | =0.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1141 is considered a high-severity vulnerability due to its potential to allow attackers to predict future random numbers.
To fix CVE-2001-1141, upgrade OpenSSL to version 0.9.6b or later.
CVE-2001-1141 affects OpenSSL versions prior to 0.9.6b and various versions of SSLeay.
Exploiting CVE-2001-1141 can allow attackers to predict cryptographic keys and compromise secure communications.
Organizations using vulnerable versions of OpenSSL or SSLeay for secure communications are at the highest risk from CVE-2001-1141.