Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-3419

Опубликовано: 07 июл. 2006
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

released

0.1.1.20-1
feisty

released

0.1.1.20-1
gutsy

released

0.1.1.20-1
hardy

released

0.1.1.20-1
intrepid

released

0.1.1.20-1
jaunty

DNE

karmic

DNE

upstream

released

0.1.1.20

Показывать по

Ссылки на источники

5 Medium

CVSS2

Связанные уязвимости

nvd
около 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

debian
около 19 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_byte ...

github
больше 3 лет назад

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

5 Medium

CVSS2