CVE-2011-0766

Source
https://cve.org/CVERecord?id=CVE-2011-0766
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-0766.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-0766
Downstream
Published
2011-05-31T20:55:01Z
Modified
2026-04-10T03:41:39.320375Z
Summary
[none]
Details

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

References

Affected packages