The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-03-19 22:59
Updated : 2023-11-07 02:23
NVD link : CVE-2015-0285
Mitre link : CVE-2015-0285
CVE.ORG link : CVE-2015-0285
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-310
Cryptographic Issues