5
CVSSv2

CVE-2001-0328

Published: 27/06/2001 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote malicious users to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.

Vulnerability Trend

Vendor Advisories

Cisco IOS® Software contains a flaw that permits the successful prediction of TCP Initial Sequence Numbers This vulnerability is present in all released versions of Cisco IOS software running on Cisco routers and switches It only affects the security of TCP connections that originate or terminate on the affected Cisco device itself; ...

Exploits

source: wwwsecurityfocuscom/bid/670/info A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions This can be used to create spoofed TCP sessions bypassing some types of IP based access controls The function 'secure_tcp_sequence_number' in the file 'drivers/char/randomc' at line 1684 ...