7.8

CVE-2008-0166

Exploit

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 0.9.8c-1 <= 0.9.8g
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version7.04
CanonicalUbuntu Linux Version7.10
CanonicalUbuntu Linux Version8.04 SwEdition-
DebianDebian Linux Version4.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.09% 0.881
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:C/I:N/A:N
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.

http://secunia.com/advisories/30220
Vendor Advisory
Broken Link
http://www.debian.org/security/2008/dsa-1571
Patch
Vendor Advisory
Mailing List
http://secunia.com/advisories/30249
Vendor Advisory
Broken Link
http://secunia.com/advisories/30136
Vendor Advisory
Broken Link
http://secunia.com/advisories/30221
Vendor Advisory
Broken Link
http://secunia.com/advisories/30231
Vendor Advisory
Broken Link
http://secunia.com/advisories/30239
Vendor Advisory
Broken Link
http://www.kb.cert.org/vuls/id/925211
Third Party Advisory
US Government Resource
http://www.securityfocus.com/archive/1/492112/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/29179
Third Party Advisory
Exploit
Broken Link
VDB Entry
http://www.securitytracker.com/id?1020017
Third Party Advisory
Broken Link
VDB Entry
http://www.ubuntu.com/usn/usn-612-1
Patch
Third Party Advisory
http://www.ubuntu.com/usn/usn-612-2
Patch
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-137A.html
Third Party Advisory
US Government Resource
Broken Link
https://www.exploit-db.com/exploits/5622
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/5632
Third Party Advisory
Exploit
VDB Entry
https://www.exploit-db.com/exploits/5720
Third Party Advisory
Exploit
VDB Entry