The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
References
Link | Resource |
---|---|
http://osvdb.org/50137 | Broken Link |
http://secunia.com/advisories/32871 | Broken Link |
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc | Vendor Advisory |
http://securitytracker.com/id?1021276 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/32447 | Broken Link Third Party Advisory VDB Entry |
http://osvdb.org/50137 | Broken Link |
http://secunia.com/advisories/32871 | Broken Link |
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc | Vendor Advisory |
http://securitytracker.com/id?1021276 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/32447 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/50137 - Broken Link | |
References | () http://secunia.com/advisories/32871 - Broken Link | |
References | () http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc - Vendor Advisory | |
References | () http://securitytracker.com/id?1021276 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/32447 - Broken Link, Third Party Advisory, VDB Entry |
14 Feb 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
References | (OSVDB) http://osvdb.org/50137 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/32871 - Broken Link | |
References | (SECTRACK) http://securitytracker.com/id?1021276 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/32447 - Broken Link, Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.0 |
CPE | cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:* |
cpe:2.3:o:freebsd:freebsd:7.1:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p10:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p12:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p14:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p15:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p13:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p16:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:7.1:p7:*:*:*:*:*:* |
CWE | CWE-362 |
CWE-330 |
Information
Published : 2008-11-26 23:30
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5162
Mitre link : CVE-2008-5162
CVE.ORG link : CVE-2008-5162
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-330
Use of Insufficiently Random Values