Search for vulnerabilities
Vulnerability ID | VCID-md12-57e6-aaae |
Aliases |
CVE-2011-0766
|
Summary | The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 7.0 |
Risk | 3.5 |
Affected and Fixed Packages | Package Details |
CWE-310 | Cryptographic Issues |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.63456 |
EPSS Score | 0.00243 |
Published At | Dec. 17, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |