ID CVE-2000-0916
Summary FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections.
References
Vulnerable Configurations
  • FreeBSD 2.0
    cpe:2.3:o:freebsd:freebsd:2.0
  • FreeBSD 3.0
    cpe:2.3:o:freebsd:freebsd:3.0
  • FreeBSD 4.0
    cpe:2.3:o:freebsd:freebsd:4.0
  • FreeBSD 4.1
    cpe:2.3:o:freebsd:freebsd:4.1
  • FreeBSD 4.1.1
    cpe:2.3:o:freebsd:freebsd:4.1.1
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description Linux kernel 2.2 Predictable TCP Initial Sequence Number Vulnerability. CVE-1999-0077 ,CVE-2000-0916,CVE-2001-0162,CVE-2001-0163,CVE-2001-0288,CVE-2001-0328...
id EDB-ID:19522
last seen 2016-02-02
modified 1999-09-27
published 1999-09-27
reporter Stealth and S. Krahmer
source https://www.exploit-db.com/download/19522/
title Linux kernel 2.2 Predictable TCP Initial Sequence Number Vulnerability
nessus via4
NASL family General
NASL id TCP_SEQ.NASL
description The remote host has predictable TCP sequence numbers. An attacker may use this flaw to establish spoofed TCP connections to this host.
last seen 2019-02-21
modified 2018-08-01
plugin id 10443
published 2003-03-03
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10443
title TCP/IP Predictable ISN (Initial Sequence Number) Generation Weakness
refmap via4
bid 1766
freebsd FreeBSD-SA-00:52
Last major update 05-09-2008 - 16:22
Published 19-12-2000 - 00:00
Back to Top