Linux Kernel TCP Sequence Number Generation Security Weakness

The Linux kernel is prone to a security weakness related to TCP sequence number generation.

Attackers can exploit this issue to inject arbitrary packets into TCP sessions using brute force attack, to perform unauthorized actions. Attackers can cause a denial-of-service condition by injecting a SYN or RST packet into the TCP session, which terminates the established connection. Other attacks such as man-in-the-middle attacks are also possible.


 

Privacy Statement
Copyright 2010, SecurityFocus