Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-3238


The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."


Published

2009-09-18T10:30:01.267

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-338

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 2.6.30 Yes
Operating System canonical ubuntu_linux 6.06 Yes
Operating System canonical ubuntu_linux 8.04 Yes
Operating System canonical ubuntu_linux 8.10 Yes
Operating System canonical ubuntu_linux 9.04 Yes
Operating System opensuse opensuse 11.0 Yes
Operating System suse linux_enterprise_desktop 10 Yes
Operating System suse linux_enterprise_server 10 Yes

References