Vulnerability Name: CVE-2007-2782 (CCN-139) Assigned: 1995-01-01 Published: 1995-01-01 Updated: 2018-10-16 Summary: Packeteer PacketShaper uses fixed increments in TCP initial sequence number (ISN) values, which allows remote attackers to predict the ISN value, and perform session hijacking or disruption. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-Other Vulnerability Consequences: Bypass Security References: Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-00:52TCP uses weak initial sequence numbers Source: CCN Type: SGI Security Advisory 20020303-01-AIRIX TCP/IP Initial Sequence Numbers Source: CCN Type: SGI Security Advisory 20020903-01-PIP denial-of-service fixes and tunings Source: CCN Type: BugTraq Mailing List, Wed Jul 25 2001 - 18:17:28 CDTWeak TCP Sequence Numbers in Sonicwall SOHO Firewall Source: CCN Type: BugTraq Mailing List, Thu May 30 2002 - 03:45:09 CDT2 security problem Quantum SNAP server Source: CCN Type: BugTraq Mailing List, Fri May 18 2007 - 08:36:10 CDTPredictable TCP ISN in Packeteer PacketShaper Source: MITRE Type: CNACVE-1999-0077 Source: MITRE Type: CNACVE-2000-0328 Source: MITRE Type: CNACVE-2000-0916 Source: MITRE Type: CNACVE-2001-0288 Source: MITRE Type: CNACVE-2001-0328 Source: MITRE Type: CNACVE-2001-0751 Source: MITRE Type: CNACVE-2001-1104 Source: MITRE Type: CNACVE-2007-2782 Source: CCN Type: Hacker Emergency Response Team Security Advisory #00003FreeBSD IP Spoofing Source: OSVDB Type: UNKNOWN36226 Source: CCN Type: SA25344Packeteer PacketShaper TCP ISN Generation Weakness Source: SECUNIA Type: UNKNOWN25344 Source: CCN Type: SA8044SGI IRIX Multiple Vulnerabilities Source: SREASON Type: UNKNOWN2726 Source: CCN Type: ASA-2007-416HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) (HPSBUX02262) Source: CCN Type: CERT Advisory CA-1995-01IP Spoofing Attacks and Hijacked Terminal Connections Source: CCN Type: CERT Advisory CA-2001-09Statistical Weaknesses in TCP/IP Initial Sequence Numbers Source: CCN Type: CIAC Information Bulletin K-006Microsoft - Improve TCP Initial Sequence Number Randomness Source: CCN Type: CIAC Information Bulletin L-003FreeBSD TCP Sequence Number Vulnerability Source: CCN Type: CIAC Information Bulletin L-053Cisco IOS Software TCP Initial Sequence Number Improvements Source: CCN Type: CIAC Information Bulletin L-086Cisco Multiple Vulnerabilities in CBOS Source: CCN Type: Cisco Systems Field Notice, May 22, 2001Security Advisory: More Multiple Vulnerabilities in CBOS Source: CCN Type: Cisco Systems Field Notice, February 28, 2001Cisco IOS Software TCP Initial Sequence Number Randomization Improvements Source: CCN Type: US-CERT VU#498440Multiple TCP/IP implementations may use statistically predictable initial sequence numbers Source: CCN Type: Microsoft Product Support ServicesWindows NT Service Packs Source: CCN Type: Microsoft Security Bulletin MS99-046 FAQMicrosoft Security Bulletin MS99-046: Frequently Asked Questions Source: CCN Type: Microsoft Security Bulletin MS01-033Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise Source: CCN Type: Microsoft Security Bulletin MS01-041Malformed RPC Request Can Cause Service Failure Source: CCN Type: Microsoft Security Bulletin MS01-04415 August 2001 Cumulative Patch for IIS Source: CCN Type: Microsoft Security Bulletin MS02-001Trusting Domains Do Not Verify Domain Membership of SIDs in Authorization Data Source: CCN Type: Microsoft Security Bulletin MS02-018Cumulative Patch for Internet Information Services (Q319733) Source: CCN Type: Microsoft Security Bulletin MS02-062Cumulative Patch for Internet Information Service (Q327696) Source: CCN Type: Microsoft Security Bulletin MS03-018Cumulative Patch for Internet Information Service (811114) Source: CCN Type: Microsoft Security Bulletin MS99-046Patch Available to Improve TCP Initial Sequence Number Randomness Source: CCN Type: NetScreen Security Alert 51897Predictable TCP Initial Sequence Numbers Source: CCN Type: OSVDB ID: 199Multiple Vendor TCP/IP ISN Sequence Prediction Weakness Source: CCN Type: OSVDB ID: 36226Packeteer PacketShaper TCP ISN Prediction Source: CCN Type: OSVDB ID: 4409SonicWALL SOHO Firewall Predictable TCP Sequence Source: CCN Type: OSVDB ID: 45877Aztech DSL600EU Router TCP Sequence Prediction Web Interface Access Source: CCN Type: Packeteer Web sitePacketShaper Source: BUGTRAQ Type: UNKNOWN20070518 Predictable TCP ISN in Packeteer PacketShaper Source: CCN Type: BID-107Portmaster Predictable TCP Initial Sequence Number Vulnerability Source: CCN Type: BID-1766BSD Weak initial Sequence Number Vulnerability Source: BID Type: UNKNOWN24048 Source: CCN Type: BID-24048Packeteer PacketShaper ISN TCP Packet Spoofing Vulnerability Source: CCN Type: BID-2682Multiple Vendor TCP Initial Sequence Number Statistical Vulnerability Source: CCN Type: BID-3098SonicWALL SOHO Firewall Predictable TCP Initial Sequence Number Vulnerability Source: CCN Type: BID-4892Quantum Snap Server Predictable TCP Sequence Number Vulnerability Source: CCN Type: BID-604NT Predictable TCP Sequence Number Vulnerability Source: CCN Type: BID-6249NetScreen ScreenOS Predictable Initial TCP Sequence Number Vulnerability Source: CCN Type: BID-670Linux Predictable TCP Initial Sequence Number Vulnerability Source: CCN Type: Proceedings of the Fifth USENIX UNIX Security Symposium, June 1995Simple Active Attack Against TCP Source: VUPEN Type: UNKNOWNADV-2007-1891 Source: XF Type: UNKNOWNtcp-seq-predict(139) Source: CCN Type: Microsoft Knowledge Base Article 192292Unpredictable TCP Sequence Numbers in SP4 Source: CCN Type: Microsoft Knowledge Base Article 243835How to Prevent Predictable TCP/IP Initial Sequence Numbers Vulnerable Configuration: Configuration 1 :cpe:/a:packeteer:packetshaper:7.3.0g2:*:*:*:*:*:*:* OR cpe:/a:packeteer:packetshaper:7.5.0g1:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:ibm:aix:*:*:*:*:*:*:*:* OR cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:*:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:*:*:*:*:*:*:*:* OR cpe:/o:ibm:os2:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:* OR cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:* OR cpe:/a:novell:netware:*:*:*:*:*:*:*:* OR cpe:/o:sco:unix:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:* OR cpe:/a:packeteer:packetshaper:7.3.0g2:*:*:*:*:*:*:* OR cpe:/a:packeteer:packetshaper:7.5.0g1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_7:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_8:*:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
packeteer packetshaper 7.3.0g2
packeteer packetshaper 7.5.0g1
ibm aix *
windriver bsdos *
hp hp-ux *
sgi irix *
linux linux kernel *
sun solaris *
ibm os2 *
microsoft windows 95 *
data_general dg ux *
microsoft windows nt 4.0
microsoft windows 98 *
novell netware *
sco unix *
microsoft windows 98se *
microsoft windows 2000 *
cisco ios *
microsoft windows me *
compaq tru64 *
microsoft windows xp
apple mac os *
microsoft windows 2003_server
microsoft windows vista *
packeteer packetshaper 7.3.0g2
packeteer packetshaper 7.5.0g1
microsoft windows 7 *
microsoft windows server 2008
microsoft windows server 2008 - r2
microsoft windows server 2012
microsoft windows 8 *