 
    
结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
An exact value or random number can be precisely predicted by observing previous values.
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 330 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
| 范围 | 影响 | 注释 | 
|---|---|---|
| Other | Varies by Context | 
策略:
Increase the entropy used to seed a PRNG.
策略: Libraries or Frameworks
Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
策略:
Use a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.
| 标识 | 说明 | 链接 | 
|---|---|---|
| CVE-2002-1463 | Firewall generates easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1463 | 
| CVE-1999-0074 | Listening TCP ports are sequentially allocated, allowing spoofing attacks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0074 | 
| CVE-1999-0077 | Predictable TCP sequence numbers allow spoofing. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077 | 
| CVE-2000-0335 | DNS resolver uses predictable IDs, allowing a local user to spoof DNS query results. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0335 | 
| 映射的分类名 | ImNode ID | Fit | Mapped Node Name | 
|---|---|---|---|
| PLOVER | Predictable Exact Value from Previous Values |