The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2015-03-19 15:59
Updated : 2022-12-13 04:15
NVD link : CVE-2015-0285
Mitre link : CVE-2015-0285
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
openssl
- openssl