The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:44:07.880Z
Reserved: 2002-03-15T00:00:00
Link: CVE-2001-1141

No data.

Status : Modified
Published: 2001-07-10T04:00:00.000
Modified: 2024-11-20T23:36:59.020
Link: CVE-2001-1141
