First published: Wed Nov 29 2000(Updated: )
FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0916 has a high severity due to its potential to allow TCP spoofing attacks.
To fix CVE-2000-0916, upgrade to FreeBSD version 4.1.2 or later that includes enhancements to the random number generator.
CVE-2000-0916 affects FreeBSD versions 4.1.1 and earlier, as well as potentially other BSD-based operating systems.
CVE-2000-0916 facilitates TCP connection spoofing attacks, allowing remote attackers to impersonate legitimate connections.
While CVE-2000-0916 is an older vulnerability, it remains a concern for legacy systems still using vulnerable versions of FreeBSD.