The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
CVSS v2.0 Score
5.0
/ 10.0
MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Information
- Published
- 10 juil. 2001
- Updated
- 16 avr. 2026
- Status
- Modified
- Source
- cve@mitre.org
Affected products
openssl opensslAll OpenSSL CVEs →
Versions : 0.9.1c, 0.9.2b, 0.9.3, 0.9.4, 0.9.5
ssleay ssleay
Versions : 0.8.1, 0.9, 0.9.1
Weaknesses (CWE)
NVD-CWE-Other
References (20)
- http://www.redhat.com/support/errata/RHSA-2001-051.htmlPatchVendor Advisory
- http://www.securityfocus.com/archive/1/195829PatchVendor Advisory
- http://www.securityfocus.com/bid/3004PatchVendor Advisory
- + 5 more references on NVD
Monitor your products
Get automatic alerts for every new CVE affecting your equipment.