VYPR
Unrated severityNVD Advisory· Published Mar 4, 2008· Updated Apr 23, 2026

CVE-2008-1146

CVE-2008-1146

Description

A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.

Affected products

4
  • cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*
  • Darwin/Darwin2 versions
    cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.