cvelist/2013/7xxx/CVE-2013-7373.json
2019-03-18 06:34:42 +00:00

82 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7373",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[openssl-dev] 20110416 Re: recycled pids causes PRNG to repeat",
"refsource": "MLIST",
"url": "http://marc.info/?l=openssl-dev&m=130298304903422&w=2"
},
{
"name": "http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/",
"refsource": "MISC",
"url": "http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/"
},
{
"name": "http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html",
"refsource": "CONFIRM",
"url": "http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html"
},
{
"name": "http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5",
"refsource": "MISC",
"url": "http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5"
},
{
"name": "[openssl-dev] 20110415 recycled pids causes PRNG to repeat",
"refsource": "MLIST",
"url": "http://marc.info/?l=openssl-dev&m=130289811108150&w=2"
}
]
}
}