7.5
CVSSv2

CVE-2000-0916

Published: 19/12/2000 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.

Vulnerable Product Search on Vulmon Subscribe to Product

freebsd freebsd 2.0

freebsd freebsd 4.0

freebsd freebsd 4.1

freebsd freebsd 4.1.1

freebsd freebsd 3.0

Exploits

source: wwwsecurityfocuscom/bid/670/info A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions This can be used to create spoofed TCP sessions bypassing some types of IP based access controls The function 'secure_tcp_sequence_number' in the file 'drivers/char/randomc' at line 1684 ...