First published: Wed Dec 17 2008(Updated: )
The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Classpath | =0.14 | |
GNU Classpath | =0.90 | |
GNU Classpath | =0.15 | |
GNU Classpath | =0.97.1 | |
GNU Classpath | <=0.97.2 | |
GNU Classpath | =0.17 | |
GNU Classpath | =0.16 | |
GNU Classpath | =0.9 | |
GNU Classpath | =0.96.1 | |
GNU Classpath | =0.92 | |
GNU Classpath | =0.12 | |
GNU Classpath | =0.18 | |
GNU Classpath | =0.11 | |
GNU Classpath | =0.6 | |
GNU Classpath | =0.97 | |
GNU Classpath | =0.93 | |
GNU Classpath | =0.7 | |
GNU Classpath | =0.95 | |
GNU Classpath | =0.96 | |
GNU Classpath | =0.91 | |
GNU Classpath | =0.19 | |
GNU Classpath | =0.13 | |
GNU Classpath | =0.10 | |
GNU Classpath | =0.20 | |
GNU Classpath | =0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.