| |
Vulnerability CVE-2011-4574
Published: 2021-10-27
Description: |
PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instruction, returning 0s or predictable results. |
Type:
CWE-338 (Use of Cryptographically Weak PRNG)
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
7.5/10 |
6.4/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Partial |
References: |
https://tls.mbed.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|