VYPR
Unrated severityNVD Advisory· Published Dec 17, 2008· Updated Apr 23, 2026

CVE-2008-5659

CVE-2008-5659

Description

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

Affected products

25
  • GNU/Classpath25 versions
    cpe:2.3:a:gnu:classpath:*:*:*:*:*:*:*:*+ 24 more
    • cpe:2.3:a:gnu:classpath:*:*:*:*:*:*:*:*range: <=0.97.2
    • cpe:2.3:a:gnu:classpath:0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.16:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.17:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.18:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.19:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.20:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.90:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.92:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.93:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.95:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.96:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.96.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.97:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:classpath:0.97.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.