CVE-2001-1141

The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc - () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418 -
References () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0 - () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0 -
References () http://www.linuxsecurity.com/advisories/other_advisory-1483.html - () http://www.linuxsecurity.com/advisories/other_advisory-1483.html -
References () http://www.osvdb.org/853 - () http://www.osvdb.org/853 -
References () http://www.redhat.com/support/errata/RHSA-2001-051.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2001-051.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/advisories/3475 - () http://www.securityfocus.com/advisories/3475 -
References () http://www.securityfocus.com/archive/1/195829 - Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/195829 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/3004 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/3004 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6823 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6823 -

Information

Published : 2001-07-10 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-1141

Mitre link : CVE-2001-1141

CVE.ORG link : CVE-2001-1141


JSON object : View

Products Affected

ssleay

  • ssleay

openssl

  • openssl