Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2001-1141


The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.


Published

2001-07-10T04:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openssl openssl 0.9.1c Yes
Application openssl openssl 0.9.2b Yes
Application openssl openssl 0.9.3 Yes
Application openssl openssl 0.9.4 Yes
Application openssl openssl 0.9.5 Yes
Application openssl openssl 0.9.6 Yes
Application openssl openssl 0.9.6a Yes
Application ssleay ssleay 0.8.1 Yes
Application ssleay ssleay 0.9 Yes
Application ssleay ssleay 0.9.1 Yes

References