[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Improper Handling of Insufficient Entropy in TRNG

ID: 333Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Variant





Description

True random number generators (TRNG) generally have a limited source of entropy and therefore can fail or block.

Extended Description

The rate at which true random numbers can be generated is limited. It is important that one uses them only when they are needed for security.

Likelihood of Exploit: Low to Medium

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Availability
 
DoS: crash / exit / restart
 
A program may crash or block if it runs out of random numbers.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Implementation
 
 Rather than failing on a lack of random numbers, it is often preferable to wait for more numbers to be created.
 
  

Relationships

Related CWETypeViewChain
CWE-333 ChildOf CWE-905 Category CWE-888  

Demonstrative Examples   (Details)

  1. This code uses a TRNG to generate a unique session id for new connections to a server:

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
CLASP  Failure of TRNG
 
 
CERT Java Secure Coding MSC02-J
 
Generate strong random numbers
 
 

References:
None

© SecPod Technologies