CVE-2012-2808Sensitive Information Exposure in Google Bionic

Severity
5.0MEDIUMNVD
EPSS
0.2%
top 64.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateMay 17

Description

The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

NVDgoogle/bionic4.1.0
NVDmozilla/firefox36.0.4

🔴Vulnerability Details

2
GHSA
GHSA-mrq8-v5mr-5qwj: The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 372022-05-17
GHSA
GHSA-wr4x-7qhj-2g7g: The PRNG implementation in the DNS resolver in Bionic in Android before 42022-05-17

💬Community

1
Bugzilla
Fennec name resolver uses weak DNS randomness (see CVE-2012-2808)2014-12-11