CVE-2013-7373
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0023 (0.2%)
Percentil: 45.3%
EPSS: 2026-05-06
Afecta
google:androidDescripción técnica
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Publicada: 29/4/2014, 20:55:09
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html
- http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/
- http://marc.info/?l=openssl-dev&m=130289811108150&w=2
- http://marc.info/?l=openssl-dev&m=130298304903422&w=2
- http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5
- http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html
- http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/
- http://marc.info/?l=openssl-dev&m=130289811108150&w=2