CVE-2008-0166

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
References
Link Resource
http://www.debian.org/security/2008/dsa-1571 Patch Vendor Advisory
http://www.ubuntu.com/usn/usn-612-1 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-2 Patch Third Party Advisory
http://www.securityfocus.com/bid/29179 Exploit Third Party Advisory
http://metasploit.com/users/hdm/tools/debian-openssl/ Broken Link
http://www.debian.org/security/2008/dsa-1576 Patch
http://www.ubuntu.com/usn/usn-612-3 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-4 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-7 Third Party Advisory
http://www.kb.cert.org/vuls/id/925211 Third Party Advisory US Government Resource
http://www.securitytracker.com/id?1020017 Third Party Advisory VDB Entry
http://secunia.com/advisories/30220 Vendor Advisory
http://secunia.com/advisories/30221 Vendor Advisory
http://secunia.com/advisories/30231 Vendor Advisory
http://secunia.com/advisories/30239 Vendor Advisory
http://secunia.com/advisories/30249 Vendor Advisory
http://secunia.com/advisories/30136 Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-137A.html Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5720 Exploit Third Party Advisory
https://www.exploit-db.com/exploits/5632 Exploit Third Party Advisory
https://www.exploit-db.com/exploits/5622 Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/492112/100/0/threaded Third Party Advisory VDB Entry
Configurations

Configuration 1


Information

Published : 2008-05-13 05:20

Updated : 2022-02-02 02:59


NVD link : CVE-2008-0166

Mitre link : CVE-2008-0166

Products Affected
No products.
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)