Exploit Linux Kernel 2.2 - Predictable TCP Initial Sequence Number

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19522
Проверка EDB
  1. Пройдено
Автор
STEALTH & S. KRAHMER
Тип уязвимости
REMOTE
Платформа
LINUX
CVE
cve-2004-0641 cve-2002-1463 cve-2001-1104 cve-2001-0751 cve-2001-0328 cve-2001-0288 cve-2001-0163 cve-2001-0162 cve-2000-0916 cve-1999-0077
Дата публикации
1999-09-27
Linux Kernel 2.2 - Predictable TCP Initial Sequence Number
Код:
source: https://www.securityfocus.com/bid/670/info

A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions. This can be used to create spoofed TCP sessions bypassing some types of IP based access controls.

The function 'secure_tcp_sequence_number' in the file 'drivers/char/random.c' at line 1684 is used to generate the initial sequence number. It used the MD4 hash with a set of inputs to generate the new ISN. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19522.tar.gz
 
Источник
www.exploit-db.com

Похожие темы