5
CVSSv2

CVE-2013-7372

Published: 29/04/2014 Updated: 30/04/2014
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony up to and including 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android prior to 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013.

Vulnerable Product Search on Vulmon Subscribe to Product

google android 4.0

apache harmony

google android 4.3

google android 4.0.3

google android 4.0.1

google android 4.2.2

google android 4.2.1

google android 4.2

google android 4.1.2

google android 4.1

google android

google android 4.0.4

google android 4.0.2