ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/7651 | third party advisory vdb entry |
http://www.securityfocus.com/bid/3620 | patch vdb entry vendor advisory broken link third party advisory |
http://marc.info/?l=bugtraq&m=100749428517090&w=2 | exploit mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7653 | third party advisory vdb entry |
http://www.valicert.com/support/security_advisory_eva.html | broken link |
http://www.securityfocus.com/bid/3618 | patch vdb entry vendor advisory broken link third party advisory |