Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5162

Опубликовано: 26 нояб. 2008
Источник: debian

Описание

The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-6removedpackage
kfreebsd-6no-dsalennypackage
kfreebsd-7fixed7.1-1package
kfreebsd-7fixed7.0-7lenny1lennypackage

Связанные уязвимости

CVSS3: 7
nvd
около 17 лет назад

The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.

CVSS3: 7
github
больше 3 лет назад

The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.