Information disclosure in Google Android - CVE-2013-7373
Published: April 29, 2014 / Updated: August 10, 2020
Vulnerability identifier: #VU41738
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-7373
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Google
Affected software:
Google Android
Google Android
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
How to mitigate CVE-2013-7373
Install update from vendor's website.
Sources
- http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html
- http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/
- http://marc.info/?l=openssl-dev&m=130289811108150&w=2
- http://marc.info/?l=openssl-dev&m=130298304903422&w=2
- http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5