Vulnerability Details : CVE-2007-4311
The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator.
Exploit prediction scoring system (EPSS) score for CVE-2007-4311
Probability of exploitation activity in the next 30 days: 0.43%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-4311
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2007-4311
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-4311
-
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git;a=commit;h=bd67d4c7b11cc33ebdc346bc8926d255b354cd64
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git;a=commit;h=faa3369ac2ea7feb0dd266b6a5e8d6ab153cf925
- http://www.debian.org/security/2008/dsa-1503
-
http://www.vupen.com/english/advisories/2007/2690
Vendor Advisory
-
http://www.securityfocus.com/bid/25029
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
Products affected by CVE-2007-4311
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*