CVE-2011-0766
31.05.2011, 20:55
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.Enginsight
Vendor | Product | Version |
---|---|---|
erlang | crypto | 𝑥 ≤ 2.0.2.1 |
ssh | ssh | 𝑥 ≤ 2.0.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References