CVE-2013-7373

Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:1.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*
cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*
cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*
cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html - () http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html -
References () http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ - () http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ -
References () http://marc.info/?l=openssl-dev&m=130289811108150&w=2 - () http://marc.info/?l=openssl-dev&m=130289811108150&w=2 -
References () http://marc.info/?l=openssl-dev&m=130298304903422&w=2 - () http://marc.info/?l=openssl-dev&m=130298304903422&w=2 -
References () http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5 - () http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5 -

Information

Published : 2014-04-29 20:55

Updated : 2024-11-21 02:00


NVD link : CVE-2013-7373

Mitre link : CVE-2013-7373

CVE.ORG link : CVE-2013-7373


JSON object : View

Products Affected

google

  • android
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor