First published: Wed Dec 17 2008(Updated: )
The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Classpath | =0.14 | |
GNU Classpath | =0.90 | |
GNU Classpath | =0.15 | |
GNU Classpath | =0.97.1 | |
GNU Classpath | <=0.97.2 | |
GNU Classpath | =0.17 | |
GNU Classpath | =0.16 | |
GNU Classpath | =0.9 | |
GNU Classpath | =0.96.1 | |
GNU Classpath | =0.92 | |
GNU Classpath | =0.12 | |
GNU Classpath | =0.18 | |
GNU Classpath | =0.11 | |
GNU Classpath | =0.6 | |
GNU Classpath | =0.97 | |
GNU Classpath | =0.93 | |
GNU Classpath | =0.7 | |
GNU Classpath | =0.95 | |
GNU Classpath | =0.96 | |
GNU Classpath | =0.91 | |
GNU Classpath | =0.19 | |
GNU Classpath | =0.13 | |
GNU Classpath | =0.10 | |
GNU Classpath | =0.20 | |
GNU Classpath | =0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5659 is considered a medium severity vulnerability due to its potential to facilitate brute force attacks.
To fix CVE-2008-5659, upgrade to GNU Classpath version later than 0.97.2 that uses a more secure random number generation method.
CVE-2008-5659 affects GNU Classpath versions 0.14 and earlier, including all versions up to and including 0.97.2.
CVE-2008-5659 is a cryptographic vulnerability that arises from predictable seed generation in random number generation.
Developers using vulnerable versions of GNU Classpath for cryptographic operations could be affected, as attackers may exploit this vulnerability to compromise security.