CVE-2007-6755

SOURCE - nist

Summary

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.

EPSS Score: 0.00614 (0.787)

Common Weakness Enumeration (CWE)

SOURCE - nist

Use of a Broken or Risky Cryptographic Algorithm


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/openssldebdebian12>=3.0.11-1~deb12u2Not yet available
debian/openssldebdebianunstable>=3.2.1-3Not yet available
debian/openssldebdebian10>=1.1.1n-0+deb10u3Not yet available
debian/openssldebdebian13>=3.2.1-3Not yet available
debian/openssldebdebian11>=1.1.1w-0+deb11u1Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

8.6


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.8medium

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

8.6


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

5.8medium