The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 through 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms that rely on secrecy of those values.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/39600 - | |
References | () http://secunia.com/advisories/27879 - Vendor Advisory | |
References | () http://security.FreeBSD.org/advisories/FreeBSD-SA-07:09.random.asc - Patch | |
References | () http://www.securityfocus.com/bid/26642 - | |
References | () http://www.securitytracker.com/id?1019022 - | |
References | () http://www.vupen.com/english/advisories/2007/4053 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38764 - |
Information
Published : 2007-11-30 01:46
Updated : 2024-11-21 00:39
NVD link : CVE-2007-6150
Mitre link : CVE-2007-6150
CVE.ORG link : CVE-2007-6150
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor