CVE-2008-0166

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
References
Link Resource
http://metasploit.com/users/hdm/tools/debian-openssl/ Broken Link
http://secunia.com/advisories/30136 Broken Link Vendor Advisory
http://secunia.com/advisories/30220 Broken Link Vendor Advisory
http://secunia.com/advisories/30221 Broken Link Vendor Advisory
http://secunia.com/advisories/30231 Broken Link Vendor Advisory
http://secunia.com/advisories/30239 Broken Link Vendor Advisory
http://secunia.com/advisories/30249 Broken Link Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel Third Party Advisory
http://www.debian.org/security/2008/dsa-1571 Mailing List Patch Vendor Advisory
http://www.debian.org/security/2008/dsa-1576 Mailing List Patch
http://www.kb.cert.org/vuls/id/925211 Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/492112/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29179 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020017 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-612-1 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-2 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-3 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-4 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-7 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-137A.html Broken Link Third Party Advisory US Government Resource
https://16years.secvuln.info
https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 Third Party Advisory VDB Entry
https://news.ycombinator.com/item?id=40333169
https://www.exploit-db.com/exploits/5622 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5632 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5720 Exploit Third Party Advisory VDB Entry
http://metasploit.com/users/hdm/tools/debian-openssl/ Broken Link
http://secunia.com/advisories/30136 Broken Link Vendor Advisory
http://secunia.com/advisories/30220 Broken Link Vendor Advisory
http://secunia.com/advisories/30221 Broken Link Vendor Advisory
http://secunia.com/advisories/30231 Broken Link Vendor Advisory
http://secunia.com/advisories/30239 Broken Link Vendor Advisory
http://secunia.com/advisories/30249 Broken Link Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel Third Party Advisory
http://www.debian.org/security/2008/dsa-1571 Mailing List Patch Vendor Advisory
http://www.debian.org/security/2008/dsa-1576 Mailing List Patch
http://www.kb.cert.org/vuls/id/925211 Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/492112/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29179 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020017 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-612-1 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-2 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-3 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-4 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-7 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-137A.html Broken Link Third Party Advisory US Government Resource
https://16years.secvuln.info
https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 Third Party Advisory VDB Entry
https://news.ycombinator.com/item?id=40333169
https://www.exploit-db.com/exploits/5622 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5632 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5720 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://metasploit.com/users/hdm/tools/debian-openssl/ - Broken Link () http://metasploit.com/users/hdm/tools/debian-openssl/ - Broken Link
References () http://secunia.com/advisories/30136 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30136 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30220 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30220 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30221 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30221 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30231 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30231 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30239 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30239 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/30249 - Broken Link, Vendor Advisory () http://secunia.com/advisories/30249 - Broken Link, Vendor Advisory
References () http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel - Third Party Advisory () http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel - Third Party Advisory
References () http://www.debian.org/security/2008/dsa-1571 - Mailing List, Patch, Vendor Advisory () http://www.debian.org/security/2008/dsa-1571 - Mailing List, Patch, Vendor Advisory
References () http://www.debian.org/security/2008/dsa-1576 - Mailing List, Patch () http://www.debian.org/security/2008/dsa-1576 - Mailing List, Patch
References () http://www.kb.cert.org/vuls/id/925211 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/925211 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/archive/1/492112/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/492112/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/29179 - Broken Link, Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/29179 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1020017 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1020017 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-612-1 - Patch, Third Party Advisory () http://www.ubuntu.com/usn/usn-612-1 - Patch, Third Party Advisory
References () http://www.ubuntu.com/usn/usn-612-2 - Patch, Third Party Advisory () http://www.ubuntu.com/usn/usn-612-2 - Patch, Third Party Advisory
References () http://www.ubuntu.com/usn/usn-612-3 - Third Party Advisory () http://www.ubuntu.com/usn/usn-612-3 - Third Party Advisory
References () http://www.ubuntu.com/usn/usn-612-4 - Third Party Advisory () http://www.ubuntu.com/usn/usn-612-4 - Third Party Advisory
References () http://www.ubuntu.com/usn/usn-612-7 - Third Party Advisory () http://www.ubuntu.com/usn/usn-612-7 - Third Party Advisory
References () http://www.us-cert.gov/cas/techalerts/TA08-137A.html - Broken Link, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-137A.html - Broken Link, Third Party Advisory, US Government Resource
References () https://16years.secvuln.info - () https://16years.secvuln.info -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 - Third Party Advisory, VDB Entry
References () https://news.ycombinator.com/item?id=40333169 - () https://news.ycombinator.com/item?id=40333169 -
References () https://www.exploit-db.com/exploits/5622 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/5622 - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/5632 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/5632 - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/5720 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/5720 - Exploit, Third Party Advisory, VDB Entry

14 May 2024, 01:50

Type Values Removed Values Added
References
  • () https://16years.secvuln.info -
  • () https://news.ycombinator.com/item?id=40333169 -

09 Feb 2024, 02:45

Type Values Removed Values Added
CWE CWE-310 CWE-338
CVSS v2 : 7.8
v3 : unknown
v2 : 7.8
v3 : 7.5
CPE cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
References (BID) http://www.securityfocus.com/bid/29179 - Exploit, Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/29179 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/30239 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30239 - Broken Link, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id?1020017 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id?1020017 - Broken Link, Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2008/dsa-1576 - Patch (DEBIAN) http://www.debian.org/security/2008/dsa-1576 - Mailing List, Patch
References (SECUNIA) http://secunia.com/advisories/30221 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30221 - Broken Link, Vendor Advisory
References (CERT) http://www.us-cert.gov/cas/techalerts/TA08-137A.html - Third Party Advisory, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA08-137A.html - Broken Link, Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/30136 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30136 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/30231 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30231 - Broken Link, Vendor Advisory
References (DEBIAN) http://www.debian.org/security/2008/dsa-1571 - Patch, Vendor Advisory (DEBIAN) http://www.debian.org/security/2008/dsa-1571 - Mailing List, Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/30249 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30249 - Broken Link, Vendor Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/492112/100/0/threaded - Third Party Advisory, VDB Entry (BUGTRAQ) http://www.securityfocus.com/archive/1/492112/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/30220 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/30220 - Broken Link, Vendor Advisory

Information

Published : 2008-05-13 17:20

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0166

Mitre link : CVE-2008-0166

CVE.ORG link : CVE-2008-0166


JSON object : View

Products Affected

canonical

  • ubuntu_linux

debian

  • debian_linux

openssl

  • openssl
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)