Vulnerabilities > CVE-2008-3280 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Openid
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |