This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "PRNG Seed Error"
From OWASP
Line 2: | Line 2: | ||
{{Template:Vulnerability}} | {{Template:Vulnerability}} | ||
− | |||
[[ASDR Table of Contents]] | [[ASDR Table of Contents]] | ||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
==Description== | ==Description== |
Revision as of 13:43, 19 February 2009
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.ASDR Table of Contents
Last revision (mm/dd/yy): 02/19/2009
Description
The incorrect use of a seed by a Psuedo Random Number Generator [1] . A seed error is usually brought on through the erroneous generation or application of a seed state.
Risk Factors
TBD
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [2].
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: