Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wr4x-7qhj-2g7g

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.

The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.

EPSS

Процентиль: 40%
0.00184
Низкий

Связанные уязвимости

nvd
почти 11 лет назад

The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.

debian
почти 11 лет назад

The PRNG implementation in the DNS resolver in Bionic in Android befor ...

EPSS

Процентиль: 40%
0.00184
Низкий