VYPR
Unrated severityNVD Advisory· Published Mar 4, 2008· Updated Apr 23, 2026

CVE-2008-1147

CVE-2008-1147

Description

A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.

Affected products

4
  • cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*
  • Darwin/Darwin2 versions
    cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.