Unrated severityNVD Advisory· Published Mar 4, 2008· Updated Apr 23, 2026
CVE-2008-1147
CVE-2008-1147
Description
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.
Affected products
4- cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/28819nvdVendor Advisory
- seclists.org/bugtraq/2008/Feb/0052.htmlnvd
- seclists.org/bugtraq/2008/Feb/0063.htmlnvd
- www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.cnvd
- www.securiteam.com/securityreviews/5PP0H0UNGW.htmlnvd
- www.securityfocus.com/archive/1/487658nvd
- www.securityfocus.com/bid/27647nvd
- www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdfnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/40329nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/41155nvd
News mentions
0No linked articles in our index yet.