CVE-2008-5162
Published Nov 26, 2008
Last updated 9 months ago
Overview
- Description
- The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
- Source
- secteam@freebsd.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-330
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62111AD4-A714-4D00-A501-D3D304BD687C", "versionEndExcluding": "7.0", "versionStartIncluding": "6.4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB6FC258-9735-4199-9499-ACFCEF30EE5E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA825CA5-84B6-4DA4-9F7F-644E532185A8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90B64FDC-01C0-4A83-827D-31F477C0359B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5666E87-F0CB-45FA-9AED-C7A0F383A559" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EA45D5C-199D-44A1-90B1-1157F899A01A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06C1FB6A-E829-4FF3-B206-8877C9747DB2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3A3BF88-7014-440D-8AC2-FB42A779F489" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "777E9236-AD46-484F-BC22-7F74AB6261F0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D308A1E-5364-483D-AB82-8269D576CEE8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93078B0C-2CA2-4A9C-A740-9947074F837C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6993EAC-AC35-4E5F-AF40-8E105CC0B34A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B0B829D-2160-4927-8896-C02D9593D9B0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87D5CC07-6D6C-4015-8EFA-D6A107E2E311" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA0358B5-0CD5-484D-AEAB-15B757F8DCC7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7932D1B4-CCC3-425E-B7D4-DD55331B0BCB" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86F07F8F-DA28-4905-B04E-303D4CF1430A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816C8B21-94CD-4BC5-B425-0343FB4148B1" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F7B4C7E-ACD2-4450-A179-4526DF58DDF3" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75D904EC-C9CD-438B-B9BE-B4B4C370761C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71B49898-6E1C-4629-832C-787B8B205403" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "250A24F5-FE83-488C-9D07-C35E6D718BFE" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55D7B8E3-25CB-4AEB-BF1B-EA115A19E762" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCEDB8D4-E96C-430C-AEFD-F20D25AAD097" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E644315A-04C5-45AB-A814-BB5A6B8C93D8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C666F892-19C7-4351-ACD1-A48048F2F234" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52DBF406-9C77-4DDA-AB7D-40FAE40023D0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E04B0A6-E6AD-4C44-BEED-7BB7EC58A0A8" } ], "operator": "OR" } ] } ]