Predictable from Observable State
Weakness ID: 341 (Weakness Base)Status: Draft
+ Description

Description Summary

A number or object is predictable based on observations that the attacker can make about the state of the system or network, such as time, process ID, etc.
+ Time of Introduction
  • Architecture and Design
  • Implementation
+ Applicable Platforms

Languages

All

+ Observed Examples
ReferenceDescription
CVE-2002-0389
CVE-2001-1141
CVE-2000-0335DNS resolver library uses predictable IDs, which allows a local attacker to spoof DNS query results.
CVE-2005-1636MFV. predictable filename and insecure permissions allows file modification to execute SQL queries.
+ Potential Mitigations

Increase the entropy used to seed a PRNG.

Phase: Implementation

Perform FIPS 140-2 tests on data to catch obvious entropy problems.

Phase: Implementation

Consider a PRNG which re-seeds itself, as needed from a high quality pseudo-random output, like hardware devices.

+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfWeakness ClassWeakness Class330Use of Insufficiently Random Values
Development Concepts (primary)699
Research Concepts (primary)1000
PeerOfWeakness BaseWeakness Base339Small Seed Space in PRNG
Research Concepts1000
+ Taxonomy Mappings
Mapped Taxonomy NameNode IDFitMapped Node Name
PLOVERPredictable from Observable State
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
PLOVERExternally Mined
Modifications
Modification DateModifierOrganizationSource
2008-07-01Eric DalciCigitalExternal
updated Time of Introduction
2008-09-08CWE Content TeamMITREInternal
updated Relationships, Taxonomy Mappings
2009-03-10CWE Content TeamMITREInternal
updated Potential Mitigations
2009-12-28CWE Content TeamMITREInternal
updated Potential Mitigations