Korean
<< Back
VID 13001
Severity 30
Port
Protocol TCP
Class Protocol
Detailed Description The TCP sequence number is predictaed. FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN). With 3 consecutive random increments captured from the responses of 4 SYN packets sent to the target, an attacker can rebuild the random state of the remote machine. This information can then be used to predict the next random increments the remote machine will make. The attacker can send packets that are forged to appear to come from trusted machines. These forged packets can compromise services, such as rsh and rlogin, because their authentication is based on IP addresses. Attackers can also perform IP address spoofing and session hijacking to gain access to the target system.

* References:
http://www.securityfocus.com/bid/1766
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:52.tcp-iss.asc
Recommendation For FreeBSD, Obtain and apply the latest patch from:
FreeBSD-SA-00:52ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:52.tcp-iss.asc
Related URL CVE-2000-0916 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)