Vulnerability CVE-2001-0328


Published: 2001-06-27   Modified: 2012-02-12

Description:
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
HP Tru64 UNIX TCP/IP remote Denial of Service (DoS)
HP SECURITY BULL...
06.10.2005

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
ftp://patches.sgi.com/support/free/security/advisories/20030201-01-P
http://securityreason.com/securityalert/57
http://www.cert.org/advisories/CA-2001-09.html
http://www.securityfocus.com/bid/2682
http://www.securitytracker.com/id/1033181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4922

Copyright 2021, cxsecurity.com

 

Back to Top