---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: FreeBSD "arc4random()" Insufficient Entropy Sources Security Issue SECUNIA ADVISORY ID: SA32871 VERIFY ADVISORY: http://secunia.com/advisories/32871/ CRITICAL: Less critical IMPACT: Brute force WHERE: >From remote OPERATING SYSTEM: FreeBSD 6.x http://secunia.com/advisories/product/6778/ DESCRIPTION: FreeBSD has acknowledged a security issue, which can be exploited by malicious people to conduct brute force attacks. The security issue is caused due to the "arc4random()" function using insufficiently random entropy sources within the first 5 minutes after starting the boot process or until collecting enough random data. This weakens applications and processes relying on the security of "arc4random()" (e.g. when creating IVs for WEP, creating IP packet identifiers, kernel RPC transaction identifiers, and within GEOM ELI and GEOM shsec providers). SOLUTION: Update FreeBSD or apply patches. Note: GEOM shsec providers created within the vulnerable time period have to be recreated after patching the system. 2008-11-24 17:39:39 UTC (RELENG_7, 7.1-PRERELEASE) 2008-11-24 17:39:39 UTC (RELENG_7_0, 7.0-RELEASE-p6) 2008-11-24 17:39:39 UTC (RELENG_6, 6.4-STABLE) 2008-11-24 17:39:39 UTC (RELENG_6_4, 6.4-RELEASE) 2008-11-24 17:39:39 UTC (RELENG_6_3, 6.3-RELEASE-p6) FreeBSD 6.x: http://security.FreeBSD.org/patches/SA-08:11/arc4random6x.patch FreeBSD 7.x: fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random.patch PROVIDED AND/OR DISCOVERED BY: The vendor credits Robert Woolley, Mark Murray, Maxim Dounin, and Ruslan Ermilov. ORIGINAL ADVISORY: FreeBSD-SA-08.11.arc4random: http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------