Description
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2008-1155 | A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND. |
References
History
No history.
Subscriptions
Apple
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Cosmicperl
Subscribe
Directory Pro
Subscribe
Darwin
Subscribe
Darwin
Subscribe
Dragonflybsd
Subscribe
Dragonflybsd
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Navision
Subscribe
Financials Server
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Openbsd
Subscribe
Openbsd
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:08:57.711Z
Reserved: 2008-03-04T00:00:00.000Z
Link: CVE-2008-1146
No data.
Status : Deferred
Published: 2008-03-04T23:44:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1146
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD