CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
88.7%
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka “Algorithm A0”), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.
Vendor | Product | Version | CPE |
---|---|---|---|
apple | mac_os_x | 10.0 | cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:* |
apple | mac_os_x | 10.0.1 | cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:* |
apple | mac_os_x | 10.0.2 | cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:* |
apple | mac_os_x | 10.0.3 | cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:* |
apple | mac_os_x | 10.0.4 | cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:* |
apple | mac_os_x | 10.1 | cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:* |
apple | mac_os_x | 10.1.1 | cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:* |
apple | mac_os_x | 10.1.2 | cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:* |
apple | mac_os_x | 10.1.3 | cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:* |
apple | mac_os_x | 10.1.4 | cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:* |
secunia.com/advisories/28819
www.securiteam.com/securityreviews/5PP0H0UNGW.html
www.securityfocus.com/archive/1/487658
www.securityfocus.com/bid/27647
www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf
exchange.xforce.ibmcloud.com/vulnerabilities/40329
exchange.xforce.ibmcloud.com/vulnerabilities/41157