CVE-2008-0166

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
References
Link Resource
http://www.debian.org/security/2008/dsa-1571 Patch Vendor Advisory
http://www.ubuntu.com/usn/usn-612-1 Patch Third Party Advisory
http://www.ubuntu.com/usn/usn-612-2 Patch Third Party Advisory
http://www.securityfocus.com/bid/29179 Exploit Third Party Advisory VDB Entry
http://metasploit.com/users/hdm/tools/debian-openssl/ Broken Link
http://www.debian.org/security/2008/dsa-1576 Patch
http://www.ubuntu.com/usn/usn-612-3 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-4 Third Party Advisory
http://www.ubuntu.com/usn/usn-612-7 Third Party Advisory
http://www.kb.cert.org/vuls/id/925211 Third Party Advisory US Government Resource
http://www.securitytracker.com/id?1020017 Third Party Advisory VDB Entry
http://secunia.com/advisories/30220 Vendor Advisory
http://secunia.com/advisories/30221 Vendor Advisory
http://secunia.com/advisories/30231 Vendor Advisory
http://secunia.com/advisories/30239 Vendor Advisory
http://secunia.com/advisories/30249 Vendor Advisory
http://secunia.com/advisories/30136 Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-137A.html Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5720 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5632 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5622 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/492112/100/0/threaded Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
OR cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Information

Published : 2008-05-13 10:20

Updated : 2022-02-02 06:59


NVD link : CVE-2008-0166

Mitre link : CVE-2008-0166


JSON object : View

CWE
CWE-310

Cryptographic Issues

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

openssl

  • openssl