Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-0766

Опубликовано: 31 мая 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.8

Описание

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

РелизСтатусПримечание
devel

not-affected

1:15.b.1-dfsg-3ubuntu2
hardy

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

1:14.b.4-dfsg-1ubuntu1
quantal

not-affected

1:15.b.1-dfsg-3ubuntu2
raring

not-affected

1:15.b.1-dfsg-3ubuntu2
upstream

released

1:14.b.3-dfsg-2, 1:15.b.1-dfsg-3

Показывать по

EPSS

Процентиль: 87%
0.03371
Низкий

7.8 High

CVSS2

Связанные уязвимости

nvd
больше 14 лет назад

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

debian
больше 14 лет назад

The random number generator in the Crypto application before 2.0.2.2, ...

github
больше 3 лет назад

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

EPSS

Процентиль: 87%
0.03371
Низкий

7.8 High

CVSS2