stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/03/05/1 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/65964 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/attachment.cgi?id=870826&action=diff Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1072180 Issue Tracking Third Party Advisory VDB Entry
https://www.stunnel.org/sdf_ChangeLog.html Release Notes Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2014-03-23T15:00:00

Updated: 2017-01-24T10:57:01

Reserved: 2013-12-03T00:00:00


Link: CVE-2014-0016

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2014-03-24T16:31:08.447

Modified: 2017-01-26T20:00:06.940


Link: CVE-2014-0016

JSON object: View

cve-icon Redhat Information

No data.

CWE