The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Crypto | Erlang | * | 2.0.2.1 (including) |
Erlang/otp | Erlang | r11b-5 (including) | r11b-5 (including) |
Erlang/otp | Erlang | r12b-5 (including) | r12b-5 (including) |
Erlang/otp | Erlang | r13b (including) | r13b (including) |
Erlang/otp | Erlang | r13b02-1 (including) | r13b02-1 (including) |
Erlang/otp | Erlang | r13b03 (including) | r13b03 (including) |
Erlang/otp | Erlang | r13b04 (including) | r13b04 (including) |
Erlang/otp | Erlang | r14a (including) | r14a (including) |
Erlang/otp | Erlang | r14b (including) | r14b (including) |
Erlang/otp | Erlang | r14b01 (including) | r14b01 (including) |
Erlang/otp | Erlang | r14b02 (including) | r14b02 (including) |
Ssh | Ssh | * | 2.0.4 (including) |
Erlang | Ubuntu | hardy | * |
Erlang | Ubuntu | lucid | * |
Erlang | Ubuntu | maverick | * |
Erlang | Ubuntu | natty | * |
Erlang | Ubuntu | oneiric | * |
Erlang | Ubuntu | upstream | * |