CVE-2008-5162

The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
References
Link Resource
http://osvdb.org/50137 Broken Link
http://secunia.com/advisories/32871 Broken Link
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc Vendor Advisory
http://securitytracker.com/id?1021276 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/32447 Broken Link Third Party Advisory VDB Entry
http://osvdb.org/50137 Broken Link
http://secunia.com/advisories/32871 Broken Link
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc Vendor Advisory
http://securitytracker.com/id?1021276 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/32447 Broken Link Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p14:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p15:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p16:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:rc2:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://osvdb.org/50137 - Broken Link () http://osvdb.org/50137 - Broken Link
References () http://secunia.com/advisories/32871 - Broken Link () http://secunia.com/advisories/32871 - Broken Link
References () http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc - Vendor Advisory () http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc - Vendor Advisory
References () http://securitytracker.com/id?1021276 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1021276 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/32447 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/32447 - Broken Link, Third Party Advisory, VDB Entry

14 Feb 2024, 16:09

Type Values Removed Values Added
References (OSVDB) http://osvdb.org/50137 - (OSVDB) http://osvdb.org/50137 - Broken Link
References (SECUNIA) http://secunia.com/advisories/32871 - (SECUNIA) http://secunia.com/advisories/32871 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1021276 - (SECTRACK) http://securitytracker.com/id?1021276 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/32447 - (BID) http://www.securityfocus.com/bid/32447 - Broken Link, Third Party Advisory, VDB Entry
CVSS v2 : 6.9
v3 : unknown
v2 : 6.9
v3 : 7.0
CPE cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:rc2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p14:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p15:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p16:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:p7:*:*:*:*:*:*
CWE CWE-310
CWE-362
CWE-330

Information

Published : 2008-11-26 23:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5162

Mitre link : CVE-2008-5162

CVE.ORG link : CVE-2008-5162


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-330

Use of Insufficiently Random Values