CVE-2014-0016 — Insufficient Entropy in PRNG in Stunnel
Severity
4.3MEDIUMNVD
EPSS
0.3%
top 45.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 24
Latest updateMay 17
Description
stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.
CVSS vector
AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages1 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2014-8102 xorg-x11-server: out of bounds access due to not validating length or offset values in XFixes extension↗2014-11-27
Bugzilla▶
CVE-2014-0213 CVE-2014-0214 CVE-2014-0215 CVE-2014-0216 CVE-2014-0217 CVE-2014-0218 moodle: upstream 2.7, 2.6.3, 2.5.6, and 2.4.10 security fixes↗2014-05-21