CVE-2011-0766

EUVD-2011-0778
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
erlangcrypto
𝑥
≤ 2.0.2.1
sshssh
𝑥
≤ 2.0.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
erlang
bookworm
1:25.2.3+dfsg-1
fixed
bullseye
1:23.2.6+dfsg-1+deb11u1
fixed
sid
1:25.3.2.12+dfsg-3
fixed
trixie
1:25.3.2.12+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
erlang
hardy
ignored
lucid
ignored
maverick
ignored
natty
ignored
oneiric
ignored
precise
not-affected
quantal
not-affected
raring
not-affected
Common Weakness Enumeration