MEDIUM · 6.8

CVE-2008-1146

A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive value...

Vulnerability Description

A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
AppleMac Os X10.0
AppleMac Os X Server10.0
DragonflybsdDragonflybsd1.0
FreebsdFreebsd4.4
NetbsdNetbsd1.6.2
OpenbsdOpenbsd2.6
CosmicperlDirectory Pro10.0.3
DarwinDarwin1.0
NavisionFinancials Server3.0

References

FAQ

What is CVE-2008-1146?

CVE-2008-1146 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive value...

How severe is CVE-2008-1146?

CVE-2008-1146 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-1146?

Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Mac Os X Server, Dragonflybsd Dragonflybsd, Freebsd Freebsd, Netbsd Netbsd.