CVE-2014-0016

N/A Unknown
Published: March 24, 2014 Modified: May 06, 2026
View on NVD

Description

stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/03/05/1
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/65964
Source: secalert@redhat.com
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1072180
Source: secalert@redhat.com
Issue Tracking Third Party Advisory VDB Entry
https://www.stunnel.org/sdf_ChangeLog.html
Source: secalert@redhat.com
Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2014/03/05/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/65964
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/attachment.cgi?id=870826&action=diff
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1072180
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory VDB Entry
https://www.stunnel.org/sdf_ChangeLog.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Vendor Advisory

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
54th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

stunnel