First published: Fri May 21 2021(Updated: )
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openid Openid |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.