CVE-2001-1141

The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*

Information

Published : 2001-07-09 21:00

Updated : 2017-10-09 18:30


NVD link : CVE-2001-1141

Mitre link : CVE-2001-1141


JSON object : View

Advertisement

dedicated server usa

Products Affected

ssleay

  • ssleay

openssl

  • openssl