CVE-2001-1141

The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ssleay:ssleay:0.9.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2001-07-10 04:00

Updated : 2023-12-10 10:17


NVD link : CVE-2001-1141

Mitre link : CVE-2001-1141

CVE.ORG link : CVE-2001-1141


JSON object : View

Products Affected

ssleay

  • ssleay

openssl

  • openssl