Difference between revisions of "PRNG Seed Error"

From OWASP
Jump to: navigation, search
(Description)
(Examples)
Line 22: Line 22:
  
 
==Examples==
 
==Examples==
 
+
TBD
===Short example name===
+
: A short example description, small picture, or sample code with [http://www.site.com links]
+
 
+
===Short example name===
+
: A short example description, small picture, or sample code with [http://www.site.com links]
+
 
+
  
 
==Related [[Attacks]]==
 
==Related [[Attacks]]==

Revision as of 08:40, 27 February 2009

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Last revision (mm/dd/yy): 02/27/2009

Vulnerabilities Table of Contents

Description

The incorrect use of a seed by a Psuedo Random Number Generator. A seed error is usually brought on through the erroneous generation or application of a seed state.

Risk Factors

TBD


Examples

TBD

Related Attacks

The application of a seed state that is known to an attacker can lead to a permanent compromise attack [1].


Related Vulnerabilities

Related Controls


Related Technical Impacts


References

Note: A reference to related CWE or CAPEC article should be added when exists. Eg: