Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-5659

Опубликовано: 17 дек. 2008
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gnu:classpath:*:*:*:*:*:*:*:*
Версия до 0.97.2 (включая)
cpe:2.3:a:gnu:classpath:0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.91:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.92:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.93:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.95:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.96:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.96.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.97:*:*:*:*:*:*:*
cpe:2.3:a:gnu:classpath:0.97.1:*:*:*:*:*:*:*

EPSS

Процентиль: 82%
0.01753
Низкий

7.5 High

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
около 17 лет назад

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

redhat
около 17 лет назад

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

debian
около 17 лет назад

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earl ...

github
больше 3 лет назад

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

EPSS

Процентиль: 82%
0.01753
Низкий

7.5 High

CVSS2

Дефекты

CWE-310