CVE-2014-0878CVE-2014-0878

Affected configuration(s):

cpe:/a:ibm:java_sdk:5.0.0.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.11.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.11.1::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.11.2::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.1::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.2::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.3::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.4::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.12.5::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.13.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.14.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.15.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.0::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.1::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.2::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.3::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.4::~~technology~~~
cpe:/a:ibm:java_sdk:5.0.16.5::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.0.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.1.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.2.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.3.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.4.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.5.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.6.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.7.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.8.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.8.1::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.9.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.9.1::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.9.2::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.10.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.10.1::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.11.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.12.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.13.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.13.1::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.13.2::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.14.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.15.0::~~technology~~~
cpe:/a:ibm:java_sdk:6.0.15.1::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.0.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.1.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.2.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.3.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.4.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.4.1::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.4.2::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.5.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.6.0::~~technology~~~
cpe:/a:ibm:java_sdk:7.0.6.1::~~technology~~~
cpe:/a:ibm:java_sdk:7.1.0.0::~~technology~~~

Date published: 2014-05-26T15:55:04.263-04:00

Date last modified: 2017-08-28T21:34:18.607-04:00

CVSS Score: 5.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://secunia.com/advisories/61264

Summary: The IBMSecureRandom component in the IBMJCE and IBMSecureRandom cryptographic providers in IBM SDK Java Technology Edition 5.0 before Service Refresh 16 FP6, 6 before Service Refresh 16, 6.0.1 before Service Refresh 8, 7 before Service Refresh 7, and 7R1 before Service Refresh 1 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the random number generator’s output.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.