Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD arc4random cryptographic weakness
Published:25.11.2008
Source:
SecurityVulns ID:9463
Type:library
Threat Level:
6/10
Description:5 minutes after system start generated psudo-random sequences are weak.
Affected:FREEBSD : FreeBSD 7.0
 FREEBSD : FreeBSD 6.3
 FREEBSD : FreeBSD 6.4
CVE:CVE-2008-5162 (The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random (25.11.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod