The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
2011-05-31T20:55:01.780
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:C/I:N/A:N
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | erlang | crypto | ≤ 2.0.2.1 | Yes |
Application | erlang | erlang\/otp | r11b-5 | Yes |
Application | erlang | erlang\/otp | r12b-5 | Yes |
Application | erlang | erlang\/otp | r13b | Yes |
Application | erlang | erlang\/otp | r13b02-1 | Yes |
Application | erlang | erlang\/otp | r13b03 | Yes |
Application | erlang | erlang\/otp | r13b04 | Yes |
Application | erlang | erlang\/otp | r14a | Yes |
Application | erlang | erlang\/otp | r14b | Yes |
Application | erlang | erlang\/otp | r14b01 | Yes |
Application | erlang | erlang\/otp | r14b02 | Yes |
Application | ssh | ssh | ≤ 2.0.4 | Yes |