Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-0766

Опубликовано: 31 мая 2011
Источник: debian
EPSS Низкий

Описание

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
erlangfixed1:14.b.3-dfsg-1package
erlangfixed1:14.a-dfsg-3squeeze1squeezepackage

Примечания

  • http://www.kb.cert.org/vuls/id/178990

  • https://github.com/erlang/otp/commit/f228601de45c5

EPSS

Процентиль: 87%
0.03371
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

nvd
больше 14 лет назад

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

github
больше 3 лет назад

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

EPSS

Процентиль: 87%
0.03371
Низкий