Skip to content

CVE-2014-0017

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

View on NVD

Severity

N/A

EPSS

Probability of exploitation (next 30 days): 0.0009 (0.1%)
Percentile: 24.8%
EPSS: 2026-05-06

Affects

libssh:libssh

Technical description

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Published: 3/14/2014, 3:55:05 PM
Last modified: 5/6/2026, 10:30:45 PM

References

HomeEventsBlogResourcesTeam