CVE-2014-0017

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
1.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
VendorProductVersion
libsshlibssh
𝑥
≤ 0.6.2
libsshlibssh
0.4.7
libsshlibssh
0.4.8
libsshlibssh
0.5.0
libsshlibssh
0.5.0:rc1
libsshlibssh
0.5.1
libsshlibssh
0.5.2
libsshlibssh
0.5.3
libsshlibssh
0.5.4
libsshlibssh
0.5.5
libsshlibssh
0.6.0
libsshlibssh
0.6.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bullseye
0.9.8-0+deb11u1
fixed
bullseye (security)
0.9.8-0+deb11u1
fixed
bookworm
0.10.6-0+deb12u1
fixed
bookworm (security)
0.10.6-0+deb12u1
fixed
sid
0.11.1-1
fixed
trixie
0.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
saucy
Fixed 0.5.4-1ubuntu0.1
released
quantal
Fixed 0.5.2-1ubuntu0.12.10.3
released
precise
Fixed 0.5.2-1ubuntu0.12.04.3
released
lucid
ignored
Common Weakness Enumeration