Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
OpenBSD PRNG DNS Cache中毒和可预测IP ID缺陷
Vulnerability Description
当在OpenBSD 2.8至4.2的版本中使用时,一个特定的采用XOR和3-bit随机跳跃(又称运算法则X3)的伪随机数字生成器(PRNG)算法,远程攻击者通过观察一系列之前生成的值推测出一些敏感值,比如DNS处理IDs。注意:一些攻击,如DNS高速缓冲存储器阻止OpenBSD对BIND的修改,可以触发该漏洞。
CVSS Information
N/A
Vulnerability Type
N/A