Secunia Security Advisory - FreeBSD has acknowledged a security issue, which can be exploited by malicious people to conduct brute force attacks.
5801f9e716905c9f89e14cca1c264120303c76e60bceeb4ae79f07fceb028112
----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
FreeBSD "arc4random()" Insufficient Entropy Sources Security Issue
SECUNIA ADVISORY ID:
SA32871
VERIFY ADVISORY:
http://secunia.com/advisories/32871/
CRITICAL:
Less critical
IMPACT:
Brute force
WHERE:
>From remote
OPERATING SYSTEM:
FreeBSD 6.x
http://secunia.com/advisories/product/6778/
DESCRIPTION:
FreeBSD has acknowledged a security issue, which can be exploited by
malicious people to conduct brute force attacks.
The security issue is caused due to the "arc4random()" function using
insufficiently random entropy sources within the first 5 minutes after
starting the boot process or until collecting enough random data. This
weakens applications and processes relying on the security of
"arc4random()" (e.g. when creating IVs for WEP, creating IP packet
identifiers, kernel RPC transaction identifiers, and within GEOM ELI
and GEOM shsec providers).
SOLUTION:
Update FreeBSD or apply patches.
Note: GEOM shsec providers created within the vulnerable time period
have to be recreated after patching the system.
2008-11-24 17:39:39 UTC (RELENG_7, 7.1-PRERELEASE)
2008-11-24 17:39:39 UTC (RELENG_7_0, 7.0-RELEASE-p6)
2008-11-24 17:39:39 UTC (RELENG_6, 6.4-STABLE)
2008-11-24 17:39:39 UTC (RELENG_6_4, 6.4-RELEASE)
2008-11-24 17:39:39 UTC (RELENG_6_3, 6.3-RELEASE-p6)
FreeBSD 6.x:
http://security.FreeBSD.org/patches/SA-08:11/arc4random6x.patch
FreeBSD 7.x:
fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random.patch
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Robert Woolley, Mark Murray, Maxim Dounin, and
Ruslan Ermilov.
ORIGINAL ADVISORY:
FreeBSD-SA-08.11.arc4random:
http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------