发布时间 :2006-04-19 12:06:00
修订时间 :2017-07-19 21:30:56

[原文]Intel RNG Driver in NetBSD 1.6 through 3.0 may incorrectly detect the presence of the pchb interface, which will cause it to always generate the same random number, which allows remote attackers to more easily crack encryption keys generated from the interface.

[CNNVD]NetBSD 错误Intel硬件RNG检测可预测随机数产生漏洞 (CNNVD-200604-304)

        NetBSD 1.6 至3.0中的 Intel RNG Driver不能正确地检测pchb接口的存在,这导致一直生成相同的随机数。该漏洞允许远程攻击者更容易地破解由该接口产生的加密密钥。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:netbsd:netbsd:1.6NetBSD 1.6
cpe:/o:netbsd:netbsd:1.6.2NetBSD 1.6.2
cpe:/o:netbsd:netbsd:2.1NetBSD 2.1
cpe:/o:netbsd:netbsd:3.0NetBSD 3.0
cpe:/o:netbsd:netbsd:2.0.2NetBSD 2.0.2
cpe:/o:netbsd:netbsd:2.0.3NetBSD 2.0.3
cpe:/o:netbsd:netbsd:1.6.1NetBSD 1.6.1
cpe:/o:netbsd:netbsd:2.0NetBSD 2.0
cpe:/o:netbsd:netbsd:2.0.1NetBSD 2.0.1
cpe:/o:netbsd:netbsd:1.6:betaNetBSD 1.6 Beta

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  17496
(UNKNOWN)  XF  netbsd-intel-rng-security-bypass(25786)

- 漏洞信息

NetBSD 错误Intel硬件RNG检测可预测随机数产生漏洞
低危 设计错误
2006-04-19 00:00:00 2006-04-20 00:00:00
        NetBSD 1.6 至3.0中的 Intel RNG Driver不能正确地检测pchb接口的存在,这导致一直生成相同的随机数。该漏洞允许远程攻击者更容易地破解由该接口产生的加密密钥。

- 公告与补丁


- 漏洞信息

NetBSD Intel Hardware Random Number Generator (RNG) Failure Encryption Weakness
Local Access Required Cryptographic, Information Disclosure
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

NetBSD contains a flaw that may reduce the quality of random numbers used when encrypting data. The issue is triggered by incorrectly detecting the presence of Intel's 'pchb' random number generator when it is not in fact present. It is possible that the flaw may allow a reduction of quality of random data used by encryption mechanisms resulting in a loss of confidentiality.

- 时间线

2006-04-12 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.0.4, 2.1.1, or 3.0.1 or higher, as they have been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者