Vulnerability Name: | CVE-2003-1230 (CCN-11397) | ||||||||
Assigned: | 2003-02-24 | ||||||||
Published: | 2003-02-24 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | The implementation of SYN cookies (syncookies) in FreeBSD 4.5 through 5.0-RELEASE-p3 uses only 32-bit internal keys when generating syncookies, which makes it easier for remote attackers to conduct brute force ISN guessing attacks and spoof legitimate traffic. | ||||||||
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-03:03.syncookies Brute force attack on SYN cookies Source: MITRE Type: CNA CVE-2003-1230 Source: CCN Type: SA8142 FreeBSD SYN cookie brute forcing Source: SECUNIA Type: Vendor Advisory 8142 Source: OSVDB Type: UNKNOWN 19785 Source: CCN Type: OSVDB ID: 19785 FreeBSD syncookies Internal Key Generation Weakness Source: FREEBSD Type: Patch, Vendor Advisory FreeBSD-SA-03:03 Source: BID Type: Patch 6920 Source: CCN Type: BID-6920 FreeBSD syncookies TCP Initial Sequence Number Weakness Source: XF Type: UNKNOWN freebsd-syncookie-brute-force(11397) Source: XF Type: UNKNOWN freebsd-syncookie-brute-force(11397) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |