The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony up to and including 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android prior to 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google android 4.0 |
||
apache harmony |
||
google android 4.3 |
||
google android 4.0.3 |
||
google android 4.0.1 |
||
google android 4.2.2 |
||
google android 4.2.1 |
||
google android 4.2 |
||
google android 4.1.2 |
||
google android 4.1 |
||
google android |
||
google android 4.0.4 |
||
google android 4.0.2 |