Unrated severityNVD Advisory· Published Mar 4, 2008· Updated Apr 23, 2026
CVE-2008-1146
CVE-2008-1146
Description
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
Affected products
4- cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- secunia.com/advisories/28819nvd
- www.securiteam.com/securityreviews/5PP0H0UNGW.htmlnvd
- www.securityfocus.com/archive/1/487658nvd
- www.securityfocus.com/bid/27647nvd
- www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdfnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/40329nvd
News mentions
0No linked articles in our index yet.