1.9
CVSSv2

CVE-2014-0017

Published: 14/03/2014 Updated: 26/03/2014
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The RAND_bytes function in libssh prior to 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Vulnerable Product Search on Vulmon Subscribe to Product

libssh libssh 0.6.1

libssh libssh 0.5.5

libssh libssh 0.5.3

libssh libssh 0.5.4

libssh libssh 0.6.0

libssh libssh

libssh libssh 0.5.1

libssh libssh 0.5.2

libssh libssh 0.4.7

libssh libssh 0.4.8

libssh libssh 0.5.0

Vendor Advisories

A security issue was fixed in libssh ...
The RAND_bytes function in libssh before 063, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision ...