Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-1833 | First vendor Publication | 2006-04-19 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Intel RNG Driver in NetBSD 1.6 through 3.0 may incorrectly detect the presence of the pchb interface, which will cause it to always generate the same random number, which allows remote attackers to more easily crack encryption keys generated from the interface. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1833 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
24577 | NetBSD Intel Hardware Random Number Generator (RNG) Failure Encryption Weakness NetBSD contains a flaw that may reduce the quality of random numbers used when encrypting data. The issue is triggered by incorrectly detecting the presence of Intel's 'pchb' random number generator when it is not in fact present. It is possible that the flaw may allow a reduction of quality of random data used by encryption mechanisms resulting in a loss of confidentiality. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:40 |
|
2024-11-28 12:08:45 |
|
2021-05-04 12:03:56 |
|
2021-04-22 01:04:28 |
|
2020-05-23 00:17:40 |
|
2017-07-20 09:23:31 |
|
2016-06-28 15:43:46 |
|
2016-04-26 14:31:01 |
|
2013-05-11 10:54:40 |
|