Description
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2008-1156 | A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting. |
References
History
No history.
Subscriptions
Apple
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Cosmicperl
Subscribe
Directory Pro
Subscribe
Darwin
Subscribe
Darwin
Subscribe
Dragonflybsd
Subscribe
Dragonflybsd
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Navision
Subscribe
Financials Server
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Openbsd
Subscribe
Openbsd
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:08:57.697Z
Reserved: 2008-03-04T00:00:00.000Z
Link: CVE-2008-1147
No data.
Status : Deferred
Published: 2008-03-04T23:44:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1147
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD