漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.
漏洞信息
N/A
漏洞
N/A
漏洞
OpenBSD PRNG DNS Cache中毒和可预测IP ID缺陷
漏洞信息
当在OpenBSD 3.5到4.2、NetBSD 1.6.2到4.0的版本中使用时,一个特定的采用ADD和0随机跳跃(又称运算法则A0)的伪随机数字生成器(PRNG)算法,允许远程攻击者通过观察一系列之前生成的值推测出一些敏感值,比如DNS处理IDs或IP分段IDs。注意:一些攻击,如DNS高速缓冲存储器阻止OpenBSD对BIND的修改,注入TCP信息包和OS指纹识别都可以触发该漏洞。
漏洞信息
N/A
漏洞
N/A