Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-0766


The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.


Published

2011-05-31T20:55:01.780

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application erlang crypto ≤ 2.0.2.1 Yes
Application erlang erlang\/otp r11b-5 Yes
Application erlang erlang\/otp r12b-5 Yes
Application erlang erlang\/otp r13b Yes
Application erlang erlang\/otp r13b02-1 Yes
Application erlang erlang\/otp r13b03 Yes
Application erlang erlang\/otp r13b04 Yes
Application erlang erlang\/otp r14a Yes
Application erlang erlang\/otp r14b Yes
Application erlang erlang\/otp r14b01 Yes
Application erlang erlang\/otp r14b02 Yes
Application ssh ssh ≤ 2.0.4 Yes

References