Information Exposure Affecting freebsd package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.46% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FREEBSD-2383115
  • published26 Jan 2022
  • disclosed4 Mar 2008
  • creditUnknown

Introduced: 4 Mar 2008

CVE-2008-1148  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for freebsd.

Overview

Affected versions of this package are vulnerable to Information Exposure. A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.

References

CVSS Scores

version 3.1