![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2008-5162 |
Description: | The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.61921 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5162 BugTraq ID: 32447 http://www.securityfocus.com/bid/32447 FreeBSD Security Advisory: FreeBSD-SA-08:11 http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc http://osvdb.org/50137 http://securitytracker.com/id?1021276 http://secunia.com/advisories/32871 |