Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-5659


The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.


Published

2008-12-17T20:30:01.030

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu classpath ≤ 0.97.2 Yes
Application gnu classpath 0.6 Yes
Application gnu classpath 0.7 Yes
Application gnu classpath 0.8 Yes
Application gnu classpath 0.9 Yes
Application gnu classpath 0.10 Yes
Application gnu classpath 0.11 Yes
Application gnu classpath 0.12 Yes
Application gnu classpath 0.13 Yes
Application gnu classpath 0.14 Yes
Application gnu classpath 0.15 Yes
Application gnu classpath 0.16 Yes
Application gnu classpath 0.17 Yes
Application gnu classpath 0.18 Yes
Application gnu classpath 0.19 Yes
Application gnu classpath 0.20 Yes
Application gnu classpath 0.90 Yes
Application gnu classpath 0.91 Yes
Application gnu classpath 0.92 Yes
Application gnu classpath 0.93 Yes
Application gnu classpath 0.95 Yes
Application gnu classpath 0.96 Yes
Application gnu classpath 0.96.1 Yes
Application gnu classpath 0.97 Yes
Application gnu classpath 0.97.1 Yes

References