CVE-2008-5659
17.12.2008, 20:30
The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | classpath | 𝑥 ≤ 0.97.2 |
gnu | classpath | 0.6 |
gnu | classpath | 0.7 |
gnu | classpath | 0.8 |
gnu | classpath | 0.9 |
gnu | classpath | 0.10 |
gnu | classpath | 0.11 |
gnu | classpath | 0.12 |
gnu | classpath | 0.13 |
gnu | classpath | 0.14 |
gnu | classpath | 0.15 |
gnu | classpath | 0.16 |
gnu | classpath | 0.17 |
gnu | classpath | 0.18 |
gnu | classpath | 0.19 |
gnu | classpath | 0.20 |
gnu | classpath | 0.90 |
gnu | classpath | 0.91 |
gnu | classpath | 0.92 |
gnu | classpath | 0.93 |
gnu | classpath | 0.95 |
gnu | classpath | 0.96 |
gnu | classpath | 0.96.1 |
gnu | classpath | 0.97 |
gnu | classpath | 0.97.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References