Cisco IOS TCP Sequence Prediction

2001-03-02T00:00:00
ID OSVDB:799
Type osvdb
Reporter OSVDB
Modified 2001-03-02T00:00:00

Description

Vulnerability Description

Cisco IOS contains a flaw that may allow a malicious user to inject forged packets into the network. The issue is caused by predictable TCP sequence numbers which are used in connections that originate or terminate on the device. It is possible that the flaw may allow session hijacking resulting in a loss of confidentiality, integrity, and/or availability.

Solution Description

Upgrade to version indicated by Cisco product matrix, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Cisco IOS contains a flaw that may allow a malicious user to inject forged packets into the network. The issue is caused by predictable TCP sequence numbers which are used in connections that originate or terminate on the device. It is possible that the flaw may allow session hijacking resulting in a loss of confidentiality, integrity, and/or availability.

References:

Vendor Specific Advisory URL Other Advisory URL: http://archives.neohapsis.com/archives/cisco/2001-q1/0009.html Nessus Plugin ID:10976 ISS X-Force ID: 139 CVE-2001-0328 CVE-2001-0288 CIAC Advisory: l-053 CERT VU: 498440 CERT: CA-2001-09 Bugtraq ID: 2682