A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P
Vendors | Products |
---|---|
Openbsd |
|
Navision |
|
Netbsd |
|
Apple |
|
Darwin |
|
Dragonflybsd |
|
Cosmicperl |
|
Freebsd |
|
Configuration 1 [-]
AND |
|
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2008-03-04T23:00:00
Updated: 2017-08-07T12:57:01
Reserved: 2008-03-04T00:00:00
Link: CVE-2008-1146
JSON object: View
NVD Information
Status : Modified
Published: 2008-03-04T23:44:00.000
Modified: 2017-08-08T01:29:54.043
Link: CVE-2008-1146
JSON object: View
Redhat Information
No data.
CWE