FreeBSD : Erlang -- ssh library uses a weak random number generator (e4833927-86e5-11e0-a6b4-000a5e1e33c6)

high Nessus Plugin ID 54826

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

US-CERT reports :

The Erlang/OTP ssh library implements a number of cryptographic operations that depend on cryptographically strong random numbers.
Unfortunately the RNG used by the library is not cryptographically strong, and is further weakened by the use of predictable seed material. The RNG (Wichman-Hill) is not mixed with an entropy source.

Solution

Update the affected package.

See Also

http://erlang.org/download/otp_src_R14B03.readme

http://www.nessus.org/u?07a31cde

http://www.nessus.org/u?e5df9a1e

Plugin Details

Severity: High

ID: 54826

File Name: freebsd_pkg_e483392786e511e0a6b4000a5e1e33c6.nasl

Version: 1.10

Type: local

Published: 5/26/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:erlang, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/25/2011

Vulnerability Publication Date: 5/25/2011

Reference Information

CVE: CVE-2011-0766