CVE-2001-1141
Summary
| CVE | CVE-2001-1141 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2001-07-10 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers. |
Risk And Classification
Primary CVSS: v2.0 5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:N/A:N
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openssl | Openssl | 0.9.1c | All | All | All |
| Application | Openssl | Openssl | 0.9.2b | All | All | All |
| Application | Openssl | Openssl | 0.9.3 | All | All | All |
| Application | Openssl | Openssl | 0.9.4 | All | All | All |
| Application | Openssl | Openssl | 0.9.5 | All | All | All |
| Application | Openssl | Openssl | 0.9.6 | All | All | All |
| Application | Openssl | Openssl | 0.9.6a | All | All | All |
| Application | Ssleay | Ssleay | 0.8.1 | All | All | All |
| Application | Ssleay | Ssleay | 0.9 | All | All | All |
| Application | Ssleay | Ssleay | 0.9.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc | af854a3a-2127-422b-91ae-364da2661108 | ftp.netbsd.org | |
| OpenSSL PRNG Internal State Disclosure Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Patch, Vendor Advisory |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| MandrakeSoft Update Advisory MDKSA-2001:065 : openssl | af854a3a-2127-422b-91ae-364da2661108 | www.linux-mandrake.com | |
| www.securityfocus.com/advisories/3475 | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| LinuxSecurity.com: EnGarde: 'openssl' PRNG weakness | af854a3a-2127-422b-91ae-364da2661108 | www.linuxsecurity.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.