This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "PRNG Seed Error"
From OWASP
(→Description: - basic definition of PRNG seed error) |
(Description) |
||
(9 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{Template:Stub}} | ||
{{Template:Vulnerability}} | {{Template:Vulnerability}} | ||
+ | |||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | |||
+ | [[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]] | ||
==Description== | ==Description== | ||
− | |||
− | + | The incorrect use of a seed by a Psuedo Random Number Generator [http://cwe.mitre.org/data/definitions/335.html]. A seed error is usually brought on through the erroneous generation or application of a seed state. | |
+ | |||
− | == | + | ==Risk Factors== |
− | + | TBD | |
− | |||
− | == | + | ==Examples== |
+ | TBD | ||
− | == | + | ==Related [[Attacks]]== |
+ | |||
+ | * [[Attack 1]] | ||
+ | * [[Attack 2]] | ||
+ | The application of a seed state that is known to an attacker can lead to a permanent compromise attack [http://www.schneier.com/paper-prngs.html]. | ||
+ | |||
+ | |||
+ | |||
+ | ==Related [[Vulnerabilities]]== | ||
+ | |||
+ | * [[Vulnerability 1]] | ||
+ | * [[Vulnerabiltiy 2]] | ||
+ | |||
+ | ==Related [[Controls]]== | ||
+ | |||
+ | * [[Control 1]] | ||
+ | * [[Control 2]] | ||
+ | |||
+ | |||
+ | ==Related [[Technical Impacts]]== | ||
+ | |||
+ | * [[Technical Impact 1]] | ||
+ | * [[Technical Impact 2]] | ||
+ | |||
+ | |||
+ | ==References== | ||
+ | Note: A reference to related [http://cwe.mitre.org/ CWE] or [http://capec.mitre.org/ CAPEC] article should be added when exists. Eg: | ||
+ | |||
+ | * [http://cwe.mitre.org/data/definitions/79.html CWE 79]. | ||
+ | * http://www.link1.com | ||
+ | * [http://www.link2.com Title for the link2] | ||
+ | |||
+ | |||
+ | |||
+ | __NOTOC__ | ||
− | |||
+ | [[Category:OWASP ASDR Project]] | ||
[[Category:Cryptographic Vulnerability]] | [[Category:Cryptographic Vulnerability]] | ||
+ | [[Category:Vulnerability]] |
Latest revision as of 16:33, 12 May 2013
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Last revision (mm/dd/yy): 05/12/2013
Vulnerabilities Table of Contents
Description
The incorrect use of a seed by a Psuedo Random Number Generator [1]. A seed error is usually brought on through the erroneous generation or application of a seed state.
Risk Factors
TBD
Examples
TBD
Related Attacks
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [2].
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: