Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
OpenBSD PRNG DNS Cache中毒和可预测IP ID缺陷
Vulnerability Description
当在OpenBSD 3.5到4.2、NetBSD 1.6.2到4.0的版本中使用时,一个特定的采用ADD和0随机跳跃(又称运算法则A0)的伪随机数字生成器(PRNG)算法,允许远程攻击者通过观察一系列之前生成的值推测出一些敏感值,比如DNS处理IDs或IP分段IDs。注意:一些攻击,如DNS高速缓冲存储器阻止OpenBSD对BIND的修改,注入TCP信息包和OS指纹识别都可以触发该漏洞。
CVSS Information
N/A
Vulnerability Type
N/A