7

CVE-2008-5162

The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.

Data is provided by the National Vulnerability Database (NVD)
FreebsdFreebsd Version >= 6.4 < 7.0
FreebsdFreebsd Version6.3 Update-
FreebsdFreebsd Version6.3 Updatep1
FreebsdFreebsd Version6.3 Updatep2
FreebsdFreebsd Version6.3 Updatep3
FreebsdFreebsd Version6.3 Updatep4
FreebsdFreebsd Version6.3 Updatep5
FreebsdFreebsd Version7.0 Update-
FreebsdFreebsd Version7.0 Updatep1
FreebsdFreebsd Version7.0 Updatep3
FreebsdFreebsd Version7.0 Updatep4
FreebsdFreebsd Version7.0 Updatep5
FreebsdFreebsd Version7.1 Update-
FreebsdFreebsd Version7.1 Updatep1
FreebsdFreebsd Version7.1 Updatep10
FreebsdFreebsd Version7.1 Updatep12
FreebsdFreebsd Version7.1 Updatep13
FreebsdFreebsd Version7.1 Updatep14
FreebsdFreebsd Version7.1 Updatep15
FreebsdFreebsd Version7.1 Updatep16
FreebsdFreebsd Version7.1 Updatep2
FreebsdFreebsd Version7.1 Updatep3
FreebsdFreebsd Version7.1 Updatep4
FreebsdFreebsd Version7.1 Updatep5
FreebsdFreebsd Version7.1 Updatep6
FreebsdFreebsd Version7.1 Updatep7
FreebsdFreebsd Version7.1 Updatep8
FreebsdFreebsd Version7.1 Updatep9
FreebsdFreebsd Version7.1 Updaterc1
FreebsdFreebsd Version7.1 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.164
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-330 Use of Insufficiently Random Values

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.