6.4
CVSSv2

CVE-2014-7284

Published: 13/10/2014 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x prior to 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote malicious users to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.13.1

linux linux kernel 3.13.10

linux linux kernel 3.13.11

linux linux kernel 3.14.3

linux linux kernel 3.14.1

linux linux kernel 3.13.6

linux linux kernel 3.13.4

linux linux kernel 3.13.3

linux linux kernel 3.13.2

linux linux kernel 3.13.5

linux linux kernel 3.13.9

linux linux kernel 3.14.2

linux linux kernel 3.14.4

linux linux kernel 3.13.8

linux linux kernel 3.13.7

Vendor Advisories

Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The net_get_random_once implementation in net/core/utilsc in the Linux kernel 313x and 314x before 3145 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numb ...