TCP序列号漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105555 漏洞类型 未知
发布时间 1999-09-27 更新时间 2005-05-02
CVE编号 CVE-1999-0077 CNNVD-ID CNNVD-199501-001
漏洞平台 Linux CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/19522
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199501-001
|漏洞详情
可预测的TCP序列号允许欺骗。
|漏洞EXP
source: http://www.securityfocus.com/bid/670/info

A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions. This can be used to create spoofed TCP sessions bypassing some types of IP based access controls.

The function 'secure_tcp_sequence_number' in the file 'drivers/char/random.c' at line 1684 is used to generate the initial sequence number. It used the MD4 hash with a set of inputs to generate the new ISN. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19522.tar.gz
|参考资料

来源:XF
名称:tcp-seq-predict(139)
链接:http://xforce.iss.net/static/139.php