CVE-2011-0766
31.05.2011, 20:55
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.Enginsight
| Vendor | Product | Version |
|---|---|---|
| erlang | crypto | 𝑥 ≤ 2.0.2.1 |
| ssh | ssh | 𝑥 ≤ 2.0.4 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References