|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: erlang|
|Summary:||FreeBSD Ports: erlang|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: erlang
The random number generator in the Crypto application before 220.127.116.11,
and SSH before 2.0.5, as used in the Erlang/OTP ssh library before
R14B03, uses predictable seeds based on the current time, which makes
it easier for remote attackers to guess DSA host and SSH session keys.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2011-0766|
CERT/CC vulnerability note: VU#178990
BugTraq ID: 47980
|Copyright||Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com|
|This is only one of 51984 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.