This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "PRNG Seed Error"
From OWASP
(→Related Threats) |
|||
Line 1: | Line 1: | ||
+ | {{Template:Stub}} | ||
{{Template:Vulnerability}} | {{Template:Vulnerability}} | ||
+ | |||
+ | [[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] | ||
+ | |||
+ | |||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | |||
+ | [[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]] | ||
+ | |||
+ | [[ASDR Table of Contents]] | ||
+ | __TOC__ | ||
+ | |||
==Description== | ==Description== | ||
+ | |||
The incorrect use of a seed by a Psuedo Random Number Generator [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on through the erroneous generation or application of a seed state. | The incorrect use of a seed by a Psuedo Random Number Generator [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on through the erroneous generation or application of a seed state. | ||
− | |||
− | ==Related | + | ==Risk Factors== |
+ | |||
+ | TBD | ||
+ | |||
+ | |||
+ | ==Examples== | ||
+ | |||
+ | ===Short example name=== | ||
+ | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
+ | |||
+ | ===Short example name=== | ||
+ | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
+ | |||
+ | |||
+ | ==Related [[Attacks]]== | ||
+ | |||
+ | * [[Attack 1]] | ||
+ | * [[Attack 2]] | ||
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [http://www.schneier.com/paper-prngs.html]. | The application of a seed state that is known to an attacker can lead to a permanent compromise attack [http://www.schneier.com/paper-prngs.html]. | ||
− | |||
− | |||
− | ==Related | + | ==Related [[Vulnerabilities]]== |
+ | |||
+ | * [[Vulnerability 1]] | ||
+ | * [[Vulnerabiltiy 2]] | ||
+ | |||
+ | ==Related [[Controls]]== | ||
+ | |||
+ | * [[Control 1]] | ||
+ | * [[Control 2]] | ||
+ | |||
+ | |||
+ | ==Related [[Technical Impacts]]== | ||
+ | |||
+ | * [[Technical Impact 1]] | ||
+ | * [[Technical Impact 2]] | ||
+ | |||
+ | |||
+ | ==References== | ||
+ | Note: A reference to related [http://cwe.mitre.org/ CWE] or [http://capec.mitre.org/ CAPEC] article should be added when exists. Eg: | ||
− | + | * [http://cwe.mitre.org/data/definitions/79.html CWE 79]. | |
+ | * http://www.link1.com | ||
+ | * [http://www.link2.com Title for the link2] | ||
+ | |||
+ | |||
+ | |||
+ | __NOTOC__ | ||
− | |||
+ | [[Category:OWASP ASDR Project]] | ||
[[Category:Cryptographic Vulnerability]] | [[Category:Cryptographic Vulnerability]] |
Revision as of 12:59, 30 September 2008
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Last revision (mm/dd/yy): 09/30/2008
Vulnerabilities Table of Contents
Description
The incorrect use of a seed by a Psuedo Random Number Generator [1] . A seed error is usually brought on through the erroneous generation or application of a seed state.
Risk Factors
TBD
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [2].
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: