Vulnerability Description
The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Harmony | <= 6.0 |
| Android | <= 4.3.1 |
Related Weaknesses (CWE)
References
- http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.htmPatch
- http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper_2.pdfExploit
- https://android.googlesource.com/platform/libcore/+/kitkat-release/luni/src/mainPatch
- https://bitcoin.org/en/alert/2013-08-11-android
- http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.htmPatch
- http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper_2.pdfExploit
- https://android.googlesource.com/platform/libcore/+/kitkat-release/luni/src/mainPatch
- https://bitcoin.org/en/alert/2013-08-11-android
FAQ
What is CVE-2013-7372?
CVE-2013-7372 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache H...
How severe is CVE-2013-7372?
CVE-2013-7372 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7372?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Harmony, Google Android.