CVE-2006-3419

Source
https://cve.org/CVERecord?id=CVE-2006-3419
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-3419.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-3419
Downstream
Published
2006-07-07T00:05:00Z
Modified
2026-04-10T03:38:30.610769Z
Summary
[none]
Details

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RANDpseudobytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.

References

Affected packages