stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2014-03-23T15:00:00
Updated: 2024-08-06T08:58:26.561Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0016
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-03-24T16:31:08.447
Modified: 2024-11-21T02:01:10.920
Link: CVE-2014-0016
Redhat