Vulnerability Description
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dietlibc Project | Dietlibc | - |
| Openbsd | Openbsd | - |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libc/stdlib/random.c#rev1.16Vendor Advisory
- http://www.openwall.com/lists/oss-security/2012/03/23/14Mailing ListThird Party Advisory
- https://github.com/ensc/dietlibc/blob/master/CHANGESThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-1577Third Party Advisory
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libc/stdlib/random.c#rev1.16Vendor Advisory
- http://www.openwall.com/lists/oss-security/2012/03/23/14Mailing ListThird Party Advisory
- https://github.com/ensc/dietlibc/blob/master/CHANGESThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-1577Third Party Advisory
FAQ
What is CVE-2012-1577?
CVE-2012-1577 is a vulnerability with a CVSS score of 9.8 (CRITICAL). lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
How severe is CVE-2012-1577?
CVE-2012-1577 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2012-1577?
Check the references section above for vendor advisories and patch information. Affected products include: Dietlibc Project Dietlibc, Openbsd Openbsd, Debian Debian Linux.