OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1571-1 | New openssl packages fix predictable random number generator |
![]() |
DSA-1576-1 | New openssh packages fix predictable randomness |
![]() |
DSA-1576-2 | New openssh packages fix predictable randomness |
![]() |
USN-612-1 | OpenSSL vulnerability |
![]() |
USN-612-2 | OpenSSH vulnerability |
![]() |
USN-612-3 | OpenVPN vulnerability |
![]() |
USN-612-4 | ssl-cert vulnerability |
![]() |
USN-612-7 | OpenSSH update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:39:32.856Z
Reserved: 2008-01-09T00:00:00
Link: CVE-2008-0166

No data.

Status : Deferred
Published: 2008-05-13T17:20:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0166

No data.

No data.