CWE-342 从先前值可预测准确值
Predictable Exact Value from Previous Values
结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
基本描述
An exact value or random number can be precisely predicted by observing previous values.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 699 cwe_Ordinal: Primary
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Other | Varies by Context |
可能的缓解方案
策略:
Increase the entropy used to seed a PRNG.
MIT-2 ['Architecture and Design', 'Requirements']
策略: Libraries or Frameworks
Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
MIT-50 Implementation
策略:
Use a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1463 | Firewall generates easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1463 |
CVE-1999-0074 | Listening TCP ports are sequentially allocated, allowing spoofing attacks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0074 |
CVE-1999-0077 | Predictable TCP sequence numbers allow spoofing. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077 |
CVE-2000-0335 | DNS resolver uses predictable IDs, allowing a local user to spoof DNS query results. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0335 |
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Predictable Exact Value from Previous Values |
引用
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论