结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
An exact value or random number can be precisely predicted by observing previous values.
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Other | Varies by Context |
策略:
Increase the entropy used to seed a PRNG.
策略: Libraries or Frameworks
Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
策略:
Use a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1463 | Firewall generates easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1463 |
CVE-1999-0074 | Listening TCP ports are sequentially allocated, allowing spoofing attacks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0074 |
CVE-1999-0077 | Predictable TCP sequence numbers allow spoofing. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077 |
CVE-2000-0335 | DNS resolver uses predictable IDs, allowing a local user to spoof DNS query results. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0335 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Predictable Exact Value from Previous Values |