FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2011-0766

This CVE name corresponds to:

Entered Topic
2011-05-25 Erlang -- ssh library uses a weak random number generator

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2011-0766
Phase Assigned(20110203)

Description

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

References

Source Reference
CONFIRM https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5
CERT-VN VU#178990
BID 47980
SECUNIA 44709