This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "PRNG Seed Error"

From OWASP
Jump to: navigation, search
(Description)
 
(3 intermediate revisions by one other user not shown)
Line 2: Line 2:
 
{{Template:Vulnerability}}
 
{{Template:Vulnerability}}
  
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
[[ASDR Table of Contents]]
+
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
 
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 
  
 
==Description==
 
==Description==
  
The incorrect use of a seed by a Psuedo Random Number Generator [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on through the erroneous generation or application of a seed state.
+
The incorrect use of a seed by a Psuedo Random Number Generator [http://cwe.mitre.org/data/definitions/335.html]. A seed error is usually brought on through the erroneous generation or application of a seed state.
  
  
Line 18: Line 17:
  
 
==Examples==
 
==Examples==
 
+
TBD
===Short example name===
 
: A short example description, small picture, or sample code with [http://www.site.com links]
 
 
 
===Short example name===
 
: A short example description, small picture, or sample code with [http://www.site.com links]
 
 
 
  
 
==Related [[Attacks]]==
 
==Related [[Attacks]]==

Latest revision as of 16:33, 12 May 2013

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Last revision (mm/dd/yy): 05/12/2013

Vulnerabilities Table of Contents

Description

The incorrect use of a seed by a Psuedo Random Number Generator [1]. A seed error is usually brought on through the erroneous generation or application of a seed state.


Risk Factors

TBD


Examples

TBD

Related Attacks

The application of a seed state that is known to an attacker can lead to a permanent compromise attack [2].


Related Vulnerabilities

Related Controls


Related Technical Impacts


References

Note: A reference to related CWE or CAPEC article should be added when exists. Eg: