Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2014-0017

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.8%
CVSS Severity
CVSS v2 Score 1.9
References
Products affected by CVE-2014-0017
  • Libssh » Libssh » Version: N/A
    cpe:2.3:a:libssh:libssh:-
  • Libssh » Libssh » Version: 0.4.7
    cpe:2.3:a:libssh:libssh:0.4.7
  • Libssh » Libssh » Version: 0.4.8
    cpe:2.3:a:libssh:libssh:0.4.8
  • Libssh » Libssh » Version: 0.5.0
    cpe:2.3:a:libssh:libssh:0.5.0
  • Libssh » Libssh » Version: 0.5.1
    cpe:2.3:a:libssh:libssh:0.5.1
  • Libssh » Libssh » Version: 0.5.2
    cpe:2.3:a:libssh:libssh:0.5.2
  • Libssh » Libssh » Version: 0.5.3
    cpe:2.3:a:libssh:libssh:0.5.3
  • Libssh » Libssh » Version: 0.5.4
    cpe:2.3:a:libssh:libssh:0.5.4
  • Libssh » Libssh » Version: 0.5.5
    cpe:2.3:a:libssh:libssh:0.5.5
  • Libssh » Libssh » Version: 0.6.0
    cpe:2.3:a:libssh:libssh:0.6.0
  • Libssh » Libssh » Version: 0.6.1
    cpe:2.3:a:libssh:libssh:0.6.1
  • Libssh » Libssh » Version: 0.6.2
    cpe:2.3:a:libssh:libssh:0.6.2


Contact Us

Shodan ® - All rights reserved