[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] TCP Sequence Number Approximation Vulnerability
- Subject: [ale] TCP Sequence Number Approximation Vulnerability
- From: warlord at MIT.EDU (Derek Atkins)
- Date: Wed, 16 Mar 2011 10:40:04 -0400
- In-reply-to: <1300279398.427.156.camel@cfowler-desktop> (Chris Fowler's message of "Wed, 16 Mar 2011 08:43:18 -0400")
- References: <1300279398.427.156.camel@cfowler-desktop>
Chris Fowler <cfowler at outpostsentinel.com> writes:
> A security scan on a device running 2.4.24 came up with 'TCP Sequence
> Number Approximation Vulnerability'. Is this fixed in a later kernel.
I'm pretty sure that yes, this was long since been fixed, like years and
years and years ago.
Why are you still running 2.4.x?
> I've googled and am confused. Most posts say it does not matter but I
> do not control the bank running the scanning tool that is spewing FUD.
Basically it will allow an attacker to guess your TCP Sequence Number
and forge a TCP connection, or possibly intercept your existing one.
> Thanks,
> Chris
-derek
--
Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
Member, MIT Student Information Processing Board (SIPB)
URL: http://web.mit.edu/warlord/ PP-ASEL-IA N1NWH
warlord at MIT.EDU PGP key available